mobile device security

Results 126 - 150 of 278Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Todays enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the worlds largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Todays enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the worlds largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyers Guide to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses how mobile devices accessing enterprise data can pose security risks.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, malware, mobile antivirus, data encryption, ibm
    
PC Mall
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention, access control
    
PC Mall
Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
Palo Alto Networks
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organizations web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against todays modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesnt just exist in your smartphone or tablets browsertheres also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Weve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps dont just run on our mobile devices. They are powered by a variety of backend infrastructure a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2015
Empowering people to use Windows applications and native mobile apps on any type of devicewith full security.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, migration, remote access, remote network management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesnt just exist in your smartphone or tablets browsertheres also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
Simple, secure ways to deliver a great experience for remote users. As mobile workstyles transform the way people and businesses work, remote access is becoming more important than ever. In enabling people to work anywhere, on any device, you need to meet ITs requirements for security and manageabilitybut its just as important to consider user experience. Citrix, a leader in mobile workstyles, has long recognized that remote access has to address the needs of users as well as IT. With an entire team dedicated to user experience, Citrix has developed secure-by-design remote access solutions that make it simple for people to work the way they choose, anywhere and on any device, to deliver optimal productivity and business impact for their organizations
Tags : 
network management, network secuirty, network optimization, information technology, best practices, business intelligence, business management
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity giving people anywhere, anytime access to information via devices theyre comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security
    
McAfee
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon thats grown so popular it now has its own acronymBring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware Horizon View (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device
    
VMware, Inc
Published By: Microsoft Office 365     Published Date: May 10, 2016
Weve pulled together the top five ways Office 365 helps provide the level of security your business needs. From Advanced Threat Protection to secure mobile devices, enterprise-level security from Office 365 is there each step of the way. Weve made email security our priority, so you dont have to make it yours. Learn how to secure your email and your business today.
Tags : 
    
Microsoft Office 365
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK
Published By: Microsoft Surface     Published Date: Feb 14, 2017
Theres a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. Theyre recognizing the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.
Tags : 
    
Microsoft Surface
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.