Wireless Security White Papers

Results 1 - 25 of 200Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Citrix     Published Date: Mar 11, 2014

Empowering people to use Windows applications and native mobile apps on any type of device—with full security

Tags : citrix, xenapp, mobile applications, enterprise applications, windows applications, windows, mobile device, remote access
    
By: Kaspersky     Published Date: Feb 14, 2014

You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world.

Tags : byod, kaspersky, mobile security, wireless security, mobile, smartphone, iphone, blackberry
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected against all the new mobile security threats.

Tags : mobile security, secure networks, mobile, smartphone, iphone, mobile data, access control, security management
    
By: Citrix     Published Date: Dec 09, 2013

Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.

Tags : citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery
    
By: Citrix     Published Date: Oct 15, 2013

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Code 42     Published Date: Mar 20, 2014

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.

Tags : codefourtytwo software, code 42, endpoint backup, data protection, mobile data, mobile devices, mobile security, remote access
    
By: Nativeflow     Published Date: Feb 25, 2014

Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.

Tags : office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?

Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
By: Lumension     Published Date: Feb 07, 2014

Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Symantec     Published Date: Jan 15, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.

Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: VMware, Inc     Published Date: Dec 05, 2013

The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.

Tags : vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device
    
By: Adobe     Published Date: Nov 25, 2013

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.

Tags : it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce
    
By: Keynote     Published Date: Nov 13, 2013

Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.

Tags : cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices
    
By: Citrix     Published Date: Nov 13, 2013

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : application security, mobile computing, wireless application software, wireless security, business management
    
By: Citrix     Published Date: Nov 13, 2013

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : mobile computing, wireless application software, wireless infrastructure, wireless security, risk management
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End