Mobile Device Security Reports

About to Buy Guide: Mobile Device Management Software
sponsored by TechTarget Security
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

TechTarget Security

Transcript: Covering the basics in MDM? Why it’s time to advance your strategy
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!
Posted: 07 Nov 2012 | Published: 07 Nov 2012

BlackBerry

IT in Europe: Taking control of smartphones: Are MDMs up to the task?
sponsored by TechTarget Security
EZINE: In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

TechTarget Security

How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013

Symantec Corporation

The ClearPass Access Management System
sponsored by Aruba Networks
WHITE PAPER: This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place.
Posted: 22 May 2013 | Published: 22 May 2013

Aruba Networks

A Mobile Application Management Primer for IT
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

TechTarget Security

Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries.
Posted: 05 Jun 2012 | Published: 04 Jun 2012

Symantec Corporation

The Best of RSA: Mobile Security
sponsored by TechTarget Security
EGUIDE: To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
Posted: 03 May 2012 | Published: 03 May 2012

TechTarget Security

10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER: Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006

Sybase iAnywhere

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by TechTarget Security
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security