ComputerWeekly.com Research Library

Powered by Bitpipe.com

Handheld Device Security Research

  • Your Guide to Mobile Application Management

    Sponsored by: TechTarget Security

    This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.

  • A Mobile Application Management Primer for IT

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.

  • Mobile device protection: tackling mobile device security risks

    Sponsored by: TechTarget Security

    The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.

  • The Best of RSA: Mobile Security

    Sponsored by: TechTarget Security

    To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.

  • MDM features vs. native mobile security

    Sponsored by: TechTarget Security

    When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each.

  • Mobile Device Security Best Practices

    Sponsored by: TechTarget Security

    While mobile devices have become a key tool for businesses today, it has also introduced a number of security risks that must be addressed. In this expert guide, uncover some of the best mobile security practices and how to balance security and end-user morale.

  • IT in Europe: Taking control of smartphones: Are MDMs up to the task?

    Sponsored by: TechTarget Security

    In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.

  • E-Guide: Physical Security Awareness and Smartphone Security Policy

    Sponsored by: TechTarget Security

    In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.

  • Security risks that can affect your industry

    Sponsored by: TechTarget Security

    As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.

  • E-Guide: Identifying and addressing evolving threats

    Sponsored by: TechTarget Security

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

  • Android security settings and controls for Android enterprise security

    Sponsored by: TechTarget Security

    With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more.

  • An effective mobile device security policy

    Sponsored by: TechTarget Security

    Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.

  • Mobile data protection best practices

    Sponsored by: TechTarget Security

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

  • Top Mobile Data Protection Best Practices

    Sponsored by: TechTarget Security

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

  • Technical Guide on Mobile Security

    Sponsored by: TechTarget Security

    Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.

  • Presentation Transcript: Threat Update: Top Trends to Focus on for 2012

    Sponsored by: Symantec Corporation

    In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.

  • B.Y.O.D Without the Risk

    Sponsored by: Juniper Networks, Inc.

    As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.

  • Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World

    Sponsored by: Symantec Corporation

    Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries.

  • Mobility is moving fast. To stay in control, you have to prepare for change

    Sponsored by: IBM

    The practice of BYOD is on the rise and organizations cannot sit back and let employees roam the network with unsupervised devices. It’s time to take action and tackle the common issues and consequences of BYOD. In this paper, uncover seven (7) questions BYOD raises and how you can address them.

  • Malicious Mobile Threats Report, 2010-2011

    Sponsored by: Juniper Networks, Inc.

    Threats to mobile devices are real, and lacking proper oversight and awareness can lead to serious consequences. In this report explore new and emerging mobile threats and attack vectors, as well as gain practical threat mitigation techniques.

  • The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs

    Sponsored by: OpenText Security Solutions

    Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.

  • State of Software Security Report Volume 4

    Sponsored by: Veracode, Inc.

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Survive and Thrive: Tackling Choice, Consumerization and Cloud with BlackBerry Enterprise Server 5.0

    Sponsored by: BlackBerry

    In this presentation transcript, Sean McManus, RIM Director of Platform Advocacy, discusses the key trends in mobile computing today, and how to stay ahead with BlackBerry Enterprise Portfolio. View now to explore how you can effectively balance choice, security, flexibility and control over your enterprise mobile devices.

  • Endpoint Protection Solutions: Why the Traditional Model is Broken

    Sponsored by: OpenText Security Solutions

    Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”

  • Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.