Home
 > search for

Featured Documents related to »  mobile security white paper


Enterprise Mobile Security: Protecting Mobile Data and Increasing Productivity
Today’s mobile devices improve productivity and efficiency, but they also bring new risks to companies: confidential corporate and personal data can be lost or

mobile security white paper  security issues and actionable mobile security best practices so you can mitigate the risks your company is facing. Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » mobile security white paper


5 Best Practices for Managing Security on Mobile Devices
As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and

mobile security white paper  for Managing Security on Mobile Devices As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices. Read More
Mobile Security and Responsibility
When companies extend their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in

mobile security white paper  their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in the briefcases of users. Business processes may run more efficiently, and there may be more flexibility in working practices, but this is of little benefit if attitudes to IT use are complacent or irresponsible. Read More
Raising the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication
The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the

mobile security white paper  the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Read More
Top 5 Mobile Security Threats
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of

mobile security white paper  5 Mobile Security Threats While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More
Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

mobile security white paper  Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours Read More
Information Security Selection Software Evaluation Report
Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages

mobile security white paper  Security Selection Software Evaluation Report Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions. Read More
Sage Releases SMB Survey on Mobile Devices
Sage North America yesterday announced the results of its mobile device survey, which recently polled 490 small and midsize businesses (SMBs) in the United

mobile security white paper  Releases SMB Survey on Mobile Devices Sage North America yesterday announced the  results of its mobile device survey , which recently polled 490 small and midsize businesses (SMBs) in the United States. The Sage SMB Survey on Mobile Devices showed that employees accessed work-related information when they were not in the office most commonly using laptops (80 percent) and smartphones (81 percent), followed by tablets (57 percent). In addition, the survey found that 85 percent of respondent decision Read More
e-DMZ Security


mobile security white paper  DMZ Security Read More
New Market for Security Insurance
Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer

mobile security white paper  Market for Security Insurance Event Summary In light of the heightened exposure various companies are facing regarding website, network, and system security compromises, insurance brokers are jumping on the bandwagon, offering customized Security Insurance Polices that protect companies with information technology infrastructures against numerous risks not covered by their required standard corporate General Liability Insurance Policy. Some of the kinds of protections these policies cover are: Loss due Read More
RoamBI Flow, the New Mobile Product from Mellmo
Earlier this week MeLLmo, creator of the mobile business intelligence solution Roambi, announced a new product to be launched in June and included in its Mobile

mobile security white paper  Flow, the New Mobile Product from Mellmo Earlier this week MeLLmo, creator of the mobile business intelligence solution Roambi , announced a new product to be launched in June and included in its Mobile software stack: RoambBI Flow. RoamBI Flow , an iPad app, is an information publishing platform that enables organizations to publish information that goes beyond data visualization and analytics , incorporating data into complete sets of interactive content. RoamBI Flow intends to expand the common Read More
Mobile Device Management Comparison Guide
In this age of mobility, organizations increasingly use mobile device management (MDM) software to secure, monitor, manage, and support their mobile device

mobile security white paper  manage, and support their mobile device usage. The goal is to optimize the functionality and security of a mobile communications network while minimizing costs. If your organization is looking for MDM software, look at this MDM product comparison guide for the key features of some of today’s leading MDM solutions. Read More
Looking Beyond Mobile Device Management to Mobile Application and Enterprise Mobility
The increased deployment of mobile solutions in the workplace can make navigating the corporate landscape challenging and risky. While organizations are rightly

mobile security white paper  Beyond Mobile Device Management to Mobile Application and Enterprise Mobility The increased deployment of mobile solutions in the workplace can make navigating the corporate landscape challenging and risky. While organizations are rightly deploying mobile device management (MDM) solutions as means to secure their mobile devices, there is more to be done. This executive insight examines the need for organizations to deploy a holistic enterprise mobility management solution that goes well beyond MDM. Read More
Security Information Market Heading for Growth
The growth of security vulnerabilities is creating a new market for security information. With link sharing and cooperation among sites, it is not clear that

mobile security white paper  Information Market Heading for Growth Security Information Market Heading for Growth L. Taylor - August 31, 2000 Event Summary It is estimated that the security information market will grow to a $1.5 billion by 2003.[1] With a dearth of security professionals available, viewing online security articles offers companies the opportunity to gain information, and improve system security knowledge at low overhead and a fast pace. Via the web, IT organizations can find out about security bugs, patches, Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others