mSecurity Reports

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

DellEMC and Intel®

E-Guide: Best Practices to ensure secure mobile communication
sponsored by TechTarget Security
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

UT Dallas: University turns to smartphones for multi-year research project
sponsored by BlackBerry
CASE STUDY: UT Dallas’ Center for Children and Families has been conducting a study on adolescents’ social networks and their impact on development. To assist in data collection, the team chose BlackBerry® hosted solution from Ceryx based on its ability to provide a controlled environment for their research.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013

Symantec Corporation

Network Rightsizing Blueprint for the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
Posted: 17 Jul 2013 | Published: 20 May 2013

Aruba Networks

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Symantec Corporation

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security