Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mobile security

Results 426 - 450 of 792Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: May 14, 2015
To leapfrog the competition, businesses must act immediately to capitalize on mobility.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
enterprise applications, cloud computing, content management
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
cloud computing
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
cloud computing, content management
    
hightail
Published By: Microsoft Office 365     Published Date: May 10, 2016
We’ve pulled together the top five ways Office 365 helps provide the level of security your business needs. From Advanced Threat Protection to secure mobile devices, enterprise-level security from Office 365 is there each step of the way. We’ve made email security our priority, so you don’t have to make it yours. Learn how to secure your email — and your business — today.
Tags : 
    
Microsoft Office 365
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Stay ahead of risks inherent in modern connectivity, mobile integration and securing thermal barcode printers. This paper helps you leverage your IT know-how, by evaluating common security risks and tightening control with remote device management systems.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy
    
Zebra Technologies
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : 
mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
Kaspersky
Published By: F5 Networks Inc     Published Date: Mar 23, 2015
A powerful but radically different version of the Web’s defining standard is coming soon and new research suggests many IT departments aren’t ready. While HTTP/2 enables dramatic improvements to both the speed and security of mission-critical Web applications, most companies are likely to find deploying it a complex and time-consuming task. An exclusive new survey from IDG Research reveals that large numbers of IT professionals know little about the new protocol or the technical challenges it can present and even fewer have a strategy in place for collecting HTTP/2’s considerable benefits without suffering its potential pitfalls.
Tags : 
http, web applications, mobile bandwidth, it security standards, mobile performance, security, it management, enterprise applications
    
F5 Networks Inc
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: Microsoft Surface     Published Date: Feb 14, 2017
There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognizing the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.
Tags : 
    
Microsoft Surface
Published By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on digital transformation grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: Why government IT teams must move beyond point-to-point integration How API-led connectivity supports microservices adoption in government How government can use MuleSoft’s FedRAMP In Process integration platform to rapidly develop APIs and microservices
Tags : 
    
MuleSoft
Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost
    
Motorola
Published By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : 
wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
In this report, Aberdeen takes an in-depth look at how best-in-class organizations are using mobile messaging to improve productivity and customer service. They also define the steps that can help your organization deploy a best-in-class enterprise mobile messaging solution.
Tags : 
mobile email, sms, mms, mobile im, mobile voip, enterprise mobile messaging, mobile security, unified mobile messaging
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Tags : 
wireless, mobile, wireless security, mobile messaging, motorola, motorola good
    
Motorola
Published By: SafeNet     Published Date: Jul 20, 2010
In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!
Tags : 
safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security
    
SafeNet
Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet
Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic
    
Webroot UK
Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas, security risk
    
Symantec.cloud
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.