Enterprise Device Security Reports

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.

MDM features vs. native mobile security
sponsored by TechTarget Security
EGUIDE: When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each.
Posted: 24 Apr 2012 | Published: 20 Apr 2012

TechTarget Security

Best Practices for Managing and Understanding Mobile Authentication
sponsored by TechTarget Security
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

TechTarget Security

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

What’s the Best Focus for MDM Strategy Now?
sponsored by TechTarget Security
EBOOK: This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

TechTarget Security

The Cost and Benefits of BYOD
sponsored by TechTarget Security
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

TechTarget Security

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by OpenText Security Solutions
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

OpenText Security Solutions

Best Practices for Managing Endpoints in the Era of Consumerization
sponsored by TechTarget Mobile Computing
EBOOK: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

TechTarget Mobile Computing

Bring Your Own iPad to Work
sponsored by Aruba Networks, Inc.
WHITE PAPER: Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Aruba Networks, Inc.

Malicious Mobile Threats Report, 2010-2011
sponsored by Juniper Networks, Inc.
WHITE PAPER: Threats to mobile devices are real, and lacking proper oversight and awareness can lead to serious consequences. In this report explore new and emerging mobile threats and attack vectors, as well as gain practical threat mitigation techniques.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.