Wireless Security White Papers

Results 1 - 25 of 192Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Feb 14, 2014

You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world.

Tags : byod, kaspersky, mobile security, wireless security, mobile, smartphone, iphone, blackberry
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

Read this white paper to learn what you need to know about mobile security in corporate environments. Discover more about today's mobile threats, key threats associated with smartphones, protecting yourself against data loss and theft, and more.

Tags : mobile security, wireless security, iphone, mobile workers, mobile employees, network security, mobile computing, pda
    
By: Kaspersky     Published Date: Feb 14, 2014

If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected against all the new mobile security threats.

Tags : mobile security, secure networks, mobile, smartphone, iphone, mobile data, access control, security management
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?

Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
By: Lumension     Published Date: Feb 07, 2014

Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Code 42     Published Date: Mar 20, 2014

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.

Tags : codefourtytwo software, code 42, endpoint backup, data protection, mobile data, mobile devices, mobile security, remote access
    
By: Nativeflow     Published Date: Feb 25, 2014

Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.

Tags : office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.

Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, intrusion prevention, mobile workers
    
By: VMware, Inc     Published Date: Dec 05, 2013

The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.

Tags : vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device
    
By: Adobe     Published Date: Nov 25, 2013

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.

Tags : it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce
    
By: Keynote DeviceAnywhere     Published Date: Nov 13, 2013

Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.

Tags : cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices
    
By: Citrix     Published Date: Nov 13, 2013

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : application security, mobile computing, wireless application software, wireless security, business management
    
By: Citrix     Published Date: Nov 13, 2013

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : mobile computing, wireless application software, wireless infrastructure, wireless security, risk management
    
By: McAfee     Published Date: Nov 06, 2013

BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.

Tags : mcafee, endpoint encryption, epolicy orchestrator, drive encryption, encryption, hacker detection, internet security, smart phones
    
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: Mimecast     Published Date: Oct 17, 2013

In this video, Matt Cain, Vice President and lead e-mail analyst at Gartner, outlines some of the options available to CIOs, including running hybrid e-mail environments with tried and tested services delivered from the cloud but the Exchange server remaining onsite. Matt also discusses where Office 365 currently meets the needs of enterprise customers and where third-party services should be considered to augment its functionality in key areas.

Tags : mimecast, cloud email, unified email management, office 365, secure email, mobile workforce, matt cain, migration services
    
By: Rapid7     Published Date: Oct 15, 2013

This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.

Tags : rapid7, risk, security, real-time, infrastructure, intrusion detection, intrusion prevention, mobile computing
    
By: Neustar Inc.     Published Date: Oct 14, 2013

As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.

Tags : digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights
    
By: CDW     Published Date: Oct 10, 2013

Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.

Tags : device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End