Mobile Security Reports

Mobile data protection best practices
sponsored by TechTarget Security
EGUIDE: Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

TechTarget Security

PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs
sponsored by Dell and VMware
CASE STUDY: Learn how one firm improved diaster recovery efforts with virtualization and cut energy costs by 40%.
Posted: 10 Sep 2013 | Published: 31 Aug 2013

Dell and VMware

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by TechTarget Security
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

TechTarget Security

Protecting Data on the Go
sponsored by TechTarget Security
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

TechTarget Security

WLAN Access Control and Wi-Fi Network Needs
sponsored by TechTarget Security
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

TechTarget Security

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.

Malware Hitching a Ride on Mobile Apps?
sponsored by TechTarget Security
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

TechTarget Security

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Managing Mobile Application Security in the BYO Device Era
sponsored by TechTarget Security
EGUIDE: Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

TechTarget Security

Securing Corporate Data in the Age of Mobile Computing
sponsored by TechTarget Security
EBOOK: This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.
Posted: 20 Jan 2012 | Published: 20 Jan 2012

TechTarget Security