(Translated by https://www.hiragana.jp/)
Wireless Security White Papers - Business Exchange
The Wayback Machine - https://web.archive.org/web/20110907131023/http://whitepapers.bx.businessweek.com:80/technology/wireless/wireless_security

Wireless Security

Results 1 - 25 of 162Sort Results By: Published Date | Title | Company Name
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Dell     Published Date: Jun 28, 2011
This paper compares the differing cost structures and security scenarios typically encountered by organizations deploying information security processes in-house to those who choose to use Dell SecureWorks as a Managed Security Services Provider (MSSP).
Tags : mssp, dell, quinstreet, secureworks, managed security services provider, information management, information security, threats
     Dell
By: Dell     Published Date: Jun 28, 2011
With the ranks of mobile and remote workers expanding every day, cost-effective endpoint security is a growing business concern that enterprise IT organizations avoid at their peril. A solid approach to enterprise-wide protection focuses equally on safeguarding data and preventing unauthorized access. Download this paper to learn more.
Tags : endpoint, security, data, encryption, protection, anti-virus, nac, dlp
     Dell
By: Dell     Published Date: Jun 28, 2011
The cost of a serious security breach can be very high indeed, so most organizations devote significant resources to keeping malware and malicious hackers from getting on to the corporate network and getting access to data. Join Internet.com contributor Paul Rubens as he shows you how to conduct penetration tests and network security scans, check password security, safeguard your wireless network, and more.
Tags : malware, dell, quinstreet, hackers, penetration tests, security scans, password, safeguard
     Dell
By: Entrust     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
     Entrust
By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
     DigitalPersona UK
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement
     SAP
By: Sophos     Published Date: Jun 27, 2011
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information.
Tags : sophos, mobile workers, security, confidential information, android, ipad, laptop, iphone
     Sophos
By: Dell SecureWorks     Published Date: Apr 17, 2011
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Tags : isensor, secureworks, safeguard, firewalls, cyberthreats, threat protection, network security, midsize security
     Dell SecureWorks
By: Cisco     Published Date: Apr 14, 2011
Discover simple, affordable ways to protect your business assets while providing appropriate access to information.
Tags : cisco, data security, it, online threats., risk exposure
     Cisco
By: Cisco     Published Date: Mar 10, 2011
Fresh Direct Produce workforce is more mobile, responsive with Cisco Unified Communications. To give its employees the immediate, direct communications that the business required, Fresh Direct replaced its phone system with the Cisco Unified Communications System. The Cisco solution supports all of the company's voice, data, and wireless communications on one secure network.
Tags : cisco, unified communications, fresh direct produce, mobile, wireless communication, voice, data network, phone system
     Cisco
By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc
     Symantec.cloud
By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop
     Symantec.cloud
By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : verisign, mobile apps, code signing, mobile application development, signing certificates
     VeriSign
By: Dell SecureWorks     Published Date: Feb 08, 2011
This Executive Brief sheds light on the risk of cybercrime by profiling several "generations" of cybercriminals over time, and pointing out how the criminals, their methods and motivations have evolved.
Tags : cybercriminals, cybercrime, pay-per-install, point-and-click, secureworks, risk, criminals, business security
     Dell SecureWorks
By: WinMagic Inc.     Published Date: Feb 04, 2011
This whitepaper compares the traditional sanitization methods (overwrite, degauss, and destroy), outlined in National Institute of Standards and Technology (NIST) SP 800-88, to the crypto erase method.
Tags : winmagic, encryption, full-disk encryption, fde, file/folder encryption, key management, fde, master boot
     WinMagic Inc.
By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : usb security, network security, patch management, lumension, device management, security
     Lumension
By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
     Astaro
By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg
     Focus
By: Sprint     Published Date: Oct 18, 2010
This white paper outlines the many network considerations one must take into account when choosing to deploy an M2M solution.
Tags : sprint wholesale, cellular, hybrid networks, m2m deployment, wide-area wireless networks, local-area wireless networks
     Sprint
By: Iron Mountain     Published Date: Sep 24, 2010
Increasingly firms are adopting data protection and recovery for enterprise laptops and desktops. Read this IDC Report to find out if your PCs and Laptops are Recovery and Discovery Ready.
Tags : iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage
     Iron Mountain
By: Brocade     Published Date: Sep 07, 2010
This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.
Tags : wlan, wireless lan, wireless network performance, wireless network security, wlan security, higher education, healthcare
     Brocade
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

ADD WHITE PAPERS

Get your company's white paper reports in the hands of targeted business professionals.

Search Cancel