Home
 > search for

Featured Documents related to »  mobile security


Top 5 Mobile Security Threats
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of

mobile security  5 Mobile Security Threats While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More

Information Security Selection
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » mobile security


Enterprise Mobile Security: Protecting Mobile Data and Increasing Productivity
Today’s mobile devices improve productivity and efficiency, but they also bring new risks to companies: confidential corporate and personal data can be lost or

mobile security  security issues and actionable mobile security best practices so you can mitigate the risks your company is facing. Read More
6 Best Practices for Managing Security on Mobile Devices
If you're not protecting these mobile devices with the same diligence, there are simple steps you can take.

mobile security  for Managing Security on Mobile Devices 6 Best Practices for Managing Security on Mobile Devices Companies pay a lot of attention to managing security on company computers and servers. But what about the security risks posed by your employees' smartphones and tablets? If you're not protecting these mobile devices with the same diligence, there are simple steps you can take. Find out in Best Practices for Managing Security on Mobile Devices . You'll learn about six key things you can do to make sure your Read More
Mobile Access Security & Management
The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been

mobile security  by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices. Read More
5 Best Practices for Managing Security on Mobile Devices
As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and

mobile security  for Managing Security on Mobile Devices As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices. Read More
Network Security Management
In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’

mobile security  Security Management In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents. Read More
Security Snafu at NetBank
Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information

mobile security  Snafu at NetBank Event Summary NetBank (Nasdaq: NTBK ), an Atlanta based internet bank, suffered a major credibility blow last week when a customer named Mahesh Rao reported that he had been inadvertently given access to another customer's account, transaction history, social security number, and funds. Rao had to call NetBank five times before the problem was resolved. According to Tom Cable, Chief Technology Officer of NetBank, the problem occurred due to human error. NetBank is an FDIC insured Read More
The 7 Habits of Highly Effective Security
You know your organization needs to be proactive about security, but you don't know what that means. You’re a busy executive and you need your security agenda

mobile security  7 Habits of Highly Effective Security The 7 Habits of Highly Effective Security L. Taylor - June 6, 2000 Event Summary With cybercrime on the rise, it is important for organizations to make sure that protecting their vital information and assets, and their customers, is not getting overlooked. Sometimes it is the most basic security procedures that are overlooked, e.g,. the utilization of safe, encrypted passwords. Market Impact If every minute of downtime costs $10,000 [1], how can your organization Read More
4 Key Steps to Automate IT Security Compliance
An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and

mobile security  Key Steps to Automate IT Security Compliance 4 Key Steps to Automate IT Security Compliance If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Qualys® is headquartered in Redwood Shores, California, with offices in France, Germany, the U.K., Japan and Hong Kong, and has partners worldwide. Source : Qualys Resources Related to IT Security Compliance : Risk (Wikipedia) 4 Key Steps to Automate IT Security Compliance A Unified Approach for Read More
e-DMZ Security


mobile security  DMZ Security Read More
Network Associates RePositions Itself as a Security E-Village
With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside

mobile security  Associates RePositions Itself as a Security E-Village Event Summary Security monolith, Network Associates, Inc. (Nasdaq: NETA) has reorganized itself to become a holding company of four independent security subsidiaries: PGP Security, Sniffer Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new Read More
Security and Trust: Doing More Business Over the internet
Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet.

mobile security  and Trust: Doing More Business Over the internet If consumers don—t trust your web site, you—ll pay for it with lost sales and abandoned shopping carts. Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet . You—ll learn about the different types of technologies that provide security for sensitive data—identifying your site as trustworthy in the eyes of customers—and how making your web site safe and secure can significantly increase Read More
Targeted Mobile Promotions: An Insight into the Usage of Mobile Coupons in the Aviation Industry
With increasing adoption of smart phones and availability of services, consumers are looking at new ways of leveraging smart phone capabilities. SmartAssist is

mobile security  Mobile Promotions: An Insight into the Usage of Mobile Coupons in the Aviation Industry With increasing adoption of smart phones and availability of services, consumers are looking at new ways of leveraging smart phone capabilities. SmartAssist is an end-to-end solution for Airlines that can efficiently manage mobile coupons and redemptions on a customer’s smart phone. The solution leverages the power of location-based services and Near Field Communication (NFC), all packaged together on a sleek Read More
Security Stocks Burn Rubber
Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and

mobile security  Stocks Burn Rubber Security Stocks Burn Rubber L. Taylor - April 27th, 2000 Event Summary On February 9th, there was a fury of Distributed Denial of Service attacks that rocked the cyberworld. In response to this attack, numerous security technology corporations are seeing rapid marketcap growth. Market Impact Internet Security Systems (NASDAQ: ISSX), an Atlanta based Internet security vendor, specializes in providing leading security management solutions for the cyberworld. In January of this Read More
Internet Security and Acceleration Server
Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet

mobile security  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others