ComputerWeekly.com Research Library

Powered by Bitpipe.com

Handheld Device Security Research

  • E-Book: Technical Guide on PCI

    Sponsored by: TechTarget Security

    TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.

  • E-Guide: Mobile endpoint security and management - Best practices

    Sponsored by: TechTarget Security

    In this e-guide, uncover the challenges associated with selecting a data protection plan for your channel business as well as best practices you should consider in helping you through the process.

  • MicroScope September 2011: A special issue examining the security market

    Sponsored by: MicroScope

    Security has remained a good market for the channel to be involved in with the threats continuing to evolve and customers being forced to keep their budgets high in order to maintain protection. Not only are the threats evolving but so are the challenges to channel customers. Continue reading this e-zine to learn more.

  • Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

    Sponsored by: GroupLogic

    Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.

  • Technical Requirements for Mobile Health Care Deployments

    Sponsored by: Juniper Networks, Inc.

    With the rapid adoption of mobile devices, it’s only natural that these devices have made their way into health care facilities. However, it’s crucial that mobile devices are protected from security vulnerabilities to ensure compliance with federal regulations. This e-guide discusses best practices for mobile health care deployments.

  • Bring Your Own iPad to Work

    Sponsored by: Aruba Networks, Inc.

    Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.

  • Increasing the ROI of Mobility

    Sponsored by: Sybase, an SAP company

    Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.

  • Best Practices for Mobile Development

    Sponsored by: BlackBerry

    In this webcast, author Mike Kirkup tells about mobile development with their features and limitations and describes Smartphones which store data in the memory.

  • Troubleshooting Enterprise Activation Issues

    Sponsored by: BlackBerry

    This webcast will cover the following topics: Enterprise activation overview, Prerequisites for enterprise activation, Troubleshooting stage 1 issues: activation, Troubleshooting stage 2 issues: verifying encryption etc.

  • CRM for the Professional on the Go

    Sponsored by: BlackBerry

    Mobile CRM is something that needs to be considered now. As a business leader, you might have put it into your mental to do later box, but the reasons to make it a priority are compelling. Read this paper to discover why.

  • Developing an Effective Corporate Mobile Policy

    Sponsored by: BlackBerry

    By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.

  • BlackBerry for Healthcare

    Sponsored by: BlackBerry

    Read why BlackBerry is the leading wireless solution for keeping healthcare professionals connected to colleagues, patient details and medical information so they can provide higher quality patient care throughout the day.

  • Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption

    Sponsored by: BlackBerry

    This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.

  • Getting Mobile - Developing Your Mobility Plan

    Sponsored by: BlackBerry

    This webcast will cover how to work with business groups to gather requirements, identify needs and select the most valuable approach to a wireless application.

  • Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications

    Sponsored by: Sybase iAnywhere

    Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.

  • Top 5 IT Considerations for Secure Wireless Email

    Sponsored by: Sybase iAnywhere

    The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.

  • 10 Steps to Mobile Security

    Sponsored by: Sybase iAnywhere

    Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.

  • Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk

    Sponsored by: SecureWave

    This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.

  • Pod Slurping - An Easy Technique for Stealing Data

    Sponsored by: GFI Software

    In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.

  • Security for BlackBerry Devices with Bluetooth Wireless Technology

    Sponsored by: BlackBerry

    This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.

  • BlackBerry Wireless Enterprise Activation

    Sponsored by: BlackBerry

    This document describes how administrators can enable wireless enterprise activation for users on the BlackBerry Enterprise Server™, and how users can initiate wireless enterprise activation from their handhelds.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.