Wireless Security
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
| |
|
|
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
| |
|
|
By: Dell
Published Date: Jun 28, 2011
This paper compares the differing cost structures and security scenarios typically encountered by organizations deploying information security processes in-house to those who choose to use Dell SecureWorks as a Managed Security Services Provider (MSSP).
| |
|
|
By: Dell
Published Date: Jun 28, 2011
With the ranks of mobile and remote workers expanding every day, cost-effective endpoint security is a growing business concern that enterprise IT organizations avoid at their peril. A solid approach to enterprise-wide protection focuses equally on safeguarding data and preventing unauthorized access. Download this paper to learn more.
| |
|
|
By: Dell
Published Date: Jun 28, 2011
The cost of a serious security breach can be very high indeed, so most organizations devote significant resources to keeping malware and malicious hackers from getting on to the corporate network and getting access to data. Join Internet.com contributor Paul Rubens as he shows you how to conduct penetration tests and network security scans, check password security, safeguard your wireless network, and more.
| |
|
|
By: Entrust
Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
| |
|
|
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
| |
|
|
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
| |
|
|
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
| |
|
|
By: SAP
Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
| |
|
|
By: Sophos
Published Date: Jun 27, 2011
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information.
| |
|
|
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
| |
|
|
By: Cisco
Published Date: Apr 14, 2011
Discover simple, affordable ways to protect your business assets while providing appropriate access to information.
| |
|
|
By: Cisco
Published Date: Mar 10, 2011
Fresh Direct Produce workforce is more mobile, responsive with Cisco Unified Communications. To give its employees the immediate, direct communications that the business required, Fresh Direct replaced its phone system with the Cisco Unified Communications System. The Cisco solution supports all of the company's voice, data, and wireless communications on one secure network.
| |
|
|
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
| |
|
|
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
| |
|
|
By: VeriSign
Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
| |
|
|
This Executive Brief sheds light on the risk of cybercrime by profiling several "generations" of cybercriminals over time, and pointing out how the criminals, their methods and motivations have evolved.
| |
|
|
This whitepaper compares the traditional sanitization methods (overwrite, degauss, and destroy), outlined in National Institute of Standards and Technology (NIST) SP 800-88, to the crypto erase method.
| |
|
|
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
| |
|
|
By: Astaro
Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
| |
|
|
By: Focus
Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
| |
|
|
By: Sprint
Published Date: Oct 18, 2010
This white paper outlines the many network considerations one must take into account when choosing to deploy an M2M solution.
| |
|
|
Increasingly firms are adopting data protection and recovery for enterprise laptops and desktops. Read this IDC Report to find out if your PCs and Laptops are Recovery and Discovery Ready.
| |
|
|
By: Brocade
Published Date: Sep 07, 2010
This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.
| |
|
|
|