ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Security Research

  • Information Security Essential Guide: Strategies for Tackling BYOD

    Sponsored by: TechTarget Security

    Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.

  • WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions

    Sponsored by: TechTarget Security

    Read this e-guide from our experts at SearchNetworking.com to gain a better understanding of WLAN solutions and how to evaluate them. Inside you'll find critical questions you should ask when exploring solutions as well as a discussion about the myths surrounding cloud-managed WLANs.

  • WLAN Access Control and Wi-Fi Network Needs

    Sponsored by: TechTarget Security

    This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Sponsored by: TechTarget Security

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • Simplify Network Management with New Secure and Scable Wireless Solutions

    Sponsored by: DellEMC and Intel®

    Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.

  • Wireless Solutions for Tablets and Smartphones

    Sponsored by: Xirrus

    As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.

  • Application Control at the Wireless Edge

    Sponsored by: Xirrus

    With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.

  • Handbook: Identity and Access Management

    Sponsored by: TechTarget Security

    In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • Strategy for Securing Mobile Content - 5 Key Guidelines

    Sponsored by: Accellion, Inc.

    Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.

  • How to add Mobile Devices to Enterprise PKI solutions

    Sponsored by: OpenTrust

    Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.

  • Citrix Mobile Solutions Bundle - Product Overview

    Sponsored by: Citrix Systems, Inc.

    Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.

  • Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment

    Sponsored by: DellEMC and Intel®

    Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.

  • Mobile Device Security Lacking in Most Hospital Policy Discussions

    Sponsored by: Essextec

    This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.

  • User-Based Licensing for Endpoint Protection and BYOD

    Sponsored by: OpenText Security Solutions

    User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.

  • Network Security Visibility and Analysis Technical Guide

    Sponsored by: TechTarget Security

    This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.

  • June Information Security Magazine

    Sponsored by: TechTarget Security

    Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.

  • How iOS Encryption and Data Protection Work

    Sponsored by: Symantec Corporation

    This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.

  • Enterprise Mobility Management Options to Keep Corporate Data Safe

    Sponsored by: MobileIron

    This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.

  • Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.

    Sponsored by: Insight

    Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.

  • A holistic approach to your BYOD challenge

    Sponsored by: Insight

    Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend.

  • Hot Tips for Securing Your Wireless Network

    Sponsored by: Sophos

    Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.

  • Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You

    Sponsored by: Insight

    Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.