Handheld Security Reports

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by OpenText Security Solutions
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

OpenText Security Solutions

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

MDM features vs. native mobile security
sponsored by TechTarget Security
EGUIDE: When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each.
Posted: 24 Apr 2012 | Published: 20 Apr 2012

TechTarget Security

Mobile Device Management Live Chat
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

TechTarget Security

The Best of RSA: Mobile Security
sponsored by TechTarget Security
EGUIDE: To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
Posted: 03 May 2012 | Published: 03 May 2012

TechTarget Security

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron

MicroScope September 2011: A special issue examining the security market
sponsored by MicroScope
EZINE: Security has remained a good market for the channel to be involved in with the threats continuing to evolve and customers being forced to keep their budgets high in order to maintain protection. Not only are the threats evolving but so are the challenges to channel customers. Continue reading this e-zine to learn more.
Posted: 16 Sep 2011 | Published: 21 Oct 2011

MicroScope

Android security settings and controls for Android enterprise security
sponsored by TechTarget Security
EGUIDE: With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

Best Practices for Mobile Development
sponsored by BlackBerry
WEBCAST: In this webcast, author Mike Kirkup tells about mobile development with their features and limitations and describes Smartphones which store data in the memory.
Posted: 12 Jan 2009 | Premiered: Jan 12, 2009

BlackBerry

B.Y.O.D Without the Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.
Posted: 06 Jun 2012 | Published: 06 Jun 2012

Juniper Networks, Inc.