X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Information Security Selection
Information Security Selection
 

 mobile security white paper


Enterprise Mobile Security: Protecting Mobile Data and Increasing Productivity
Today’s mobile devices improve productivity and efficiency, but they also bring new risks to companies: confidential corporate and personal data can be lost or

mobile security white paper  security issues and actionable mobile security best practices so you can mitigate the risks your company is facing.

Read More


Information Security RFI/RFP Template

Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module ... Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Information Security Selection
Information Security Selection

Documents related to » mobile security white paper

Emerging Landscape of Mobile and Cloud Technologies in Corporate Security


Industry-leading organizations that fail to keep up with technological advancements of mobility and the cloud are becoming obsolete, while the enterprises that embrace these powerful tools will continue to benefit from all the efficiencies and cost savings. This white paper analyzes the ways in which mobile and cloud-based technology solutions can augment and improve upon existing corporate security functions in a global context.

mobile security white paper  Landscape of Mobile and Cloud Technologies in Corporate Security Industry-leading organizations that fail to keep up with technological advancements of mobility and the cloud are becoming obsolete, while the enterprises that embrace these powerful tools will continue to benefit from all the efficiencies and cost savings. This white paper analyzes the ways in which mobile and cloud-based technology solutions can augment and improve upon existing corporate security functions in a global context. Read More

5 Best Practices for Managing Security on Mobile Devices


As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices.

mobile security white paper  for Managing Security on Mobile Devices As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices. Read More

Raising the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication


The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Download this white paper now.

mobile security white paper  the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Read More

Mobile Security and Responsibility


When companies extend their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in the briefcases of users. Business processes may run more efficiently, and there may be more flexibility in working practices, but this is of little benefit if attitudes to IT use are complacent or irresponsible.

mobile security white paper  their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in the briefcases of users. Business processes may run more efficiently, and there may be more flexibility in working practices, but this is of little benefit if attitudes to IT use are complacent or irresponsible. Read More

The IT Manager's Guide to Mobile Apps for Lines of Business


Organizations worldwide are incorporating mobile devices into their arsenal of work gadgets, using devices such as smartphones for tasks ranging from checking e-mails and text messages to accessing enterprise systems. In this report, TEC research analyst Jorge Garcia examines the benefits and challenges of mobile solutions and provides guidelines for a successful mobile app deployment for the organization's lines of business.

mobile security white paper  IT Manager's Guide to Mobile Apps for Lines of Business Organizations worldwide are incorporating mobile devices into their arsenal of work gadgets, using devices such as smartphones for tasks ranging from checking e-mails and text messages to accessing enterprise systems. In this report, TEC research analyst Jorge Garcia examines the benefits and challenges of mobile solutions and provides guidelines for a successful mobile app deployment for the organization's lines of business. Read More

Pulp & Paper International


Pulp & Paper International publishes content for the pulp and paper industry. The publication’s content includes articles, event coverage, and mill visits.

mobile security white paper   Read More

BI on the Go . . . So, Who’s Using Mobile BI?


In this first of two posts, TEC senior BI and data management analyst Jorge García presents some of the main findings of the TEC 2014 mobile survey on the usage of mobile BI offerings by enterprises—who's using mobile BI offerings and from which vendors, and which industry is showing the interest in mobile BI solutions.

mobile security white paper  . So, Who’s Using Mobile BI? Piggybacking off of the success of the most recent TEC Buyer’s Guide, the 2014 Buyer's Guide on Mobile BI applications , we took the opportunity to survey users of mobile business intelligence (BI) applications and collect their impressions in regard to these tools. Most of the results of this survey with more than 250 respondents were captured in an Infographic . Additional information garnered from the survey, while not conclusive, may provide a glance into the Read More

Network Associates RePositions Itself as a Security E-Village


With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside funding and a type of web-based CIO Helpdesk.

mobile security white paper  Associates RePositions Itself as a Security E-Village Event Summary Security monolith, Network Associates, Inc. (Nasdaq: NETA) has reorganized itself to become a holding company of four independent security subsidiaries: PGP Security, Sniffer Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new Read More

Market Report: Mobile HCM


TEC recently asked end users all about their mobile HCM needs, usage, and challenges, and then asked vendors about their mobile HCM offerings and target markets. We discovered that while most participants in our survey either currently use mobile HCM technology or are considering doing so in the future, end users seem to be taking advantage of HCM mobile capabilities to complete well-known routines rather than explore new possibilities such as HR analytics. Read TEC's mobile HCM market report to find out more results of the survey and get HCM analyst Raluca Druta's take on mobile employees and how mobility fits in with HR practices.

mobile security white paper  Report: Mobile HCM TEC recently asked end users all about their mobile HCM needs, usage, and challenges, and then asked vendors about their mobile HCM offerings and target markets. We discovered that while most participants in our survey either currently use mobile HCM technology or are considering doing so in the future, end users seem to be taking advantage of HCM mobile capabilities to complete well-known routines rather than explore new possibilities such as HR analytics. Read TEC's mobile HCM Read More

New Facts on Web Security and Online transactions


Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Est...

mobile security white paper  Facts on Web Security and Online transactions Do people easily trust your Web site enough to leave their credit card information? If not, it could be costing you—big. You need to do more to gain trust Having an SSL certificate used to be enough to satisfy customer concerns, but today you have to go much further. Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Establish Trust . You'll discover how the right Read More

Looking Beyond Mobile Device Management to Mobile Application and Enterprise Mobility


The increased deployment of mobile solutions in the workplace can make navigating the corporate landscape challenging and risky. While organizations are rightly deploying mobile device management (MDM) solutions as means to secure their mobile devices, there is more to be done. This executive insight examines the need for organizations to deploy a holistic enterprise mobility management solution that goes well beyond MDM.

mobile security white paper  Beyond Mobile Device Management to Mobile Application and Enterprise Mobility The increased deployment of mobile solutions in the workplace can make navigating the corporate landscape challenging and risky. While organizations are rightly deploying mobile device management (MDM) solutions as means to secure their mobile devices, there is more to be done. This executive insight examines the need for organizations to deploy a holistic enterprise mobility management solution that goes well beyond MDM. Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

mobile security white paper  Security Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More

Patrick Townsend Security Solutions




mobile security white paper  Townsend Security Solutions Read More