Home
 > search for

Featured Documents related to »  mobile security


Top 5 Mobile Security Threats
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of

mobile security  5 Mobile Security Threats While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » mobile security


Emerging Landscape of Mobile and Cloud Technologies in Corporate Security
Industry-leading organizations that fail to keep up with technological advancements of mobility and the cloud are becoming obsolete, while the enterprises that

mobile security  Landscape of Mobile and Cloud Technologies in Corporate Security Industry-leading organizations that fail to keep up with technological advancements of mobility and the cloud are becoming obsolete, while the enterprises that embrace these powerful tools will continue to benefit from all the efficiencies and cost savings. This white paper analyzes the ways in which mobile and cloud-based technology solutions can augment and improve upon existing corporate security functions in a global context. Read More
Mobile Access Security & Management
The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been

mobile security  by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices. Read More
Mobile Security and Responsibility
When companies extend their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in

mobile security  their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in the briefcases of users. Business processes may run more efficiently, and there may be more flexibility in working practices, but this is of little benefit if attitudes to IT use are complacent or irresponsible. Read More
6 Best Practices for Managing Security on Mobile Devices
If you're not protecting these mobile devices with the same diligence, there are simple steps you can take.

mobile security  for Managing Security on Mobile Devices 6 Best Practices for Managing Security on Mobile Devices Companies pay a lot of attention to managing security on company computers and servers. But what about the security risks posed by your employees' smartphones and tablets? If you're not protecting these mobile devices with the same diligence, there are simple steps you can take. Find out in Best Practices for Managing Security on Mobile Devices . You'll learn about six key things you can do to make sure your Read More
Network Security Best Practices: Competitive Analysis
When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services

mobile security  Security Best Practices: Competitive Analysis Network Security Best Practices: Competitive Analysis If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. At CipherOptics, we make data protection simple. Whether you need to secure data flows over your application environment or encrypt data in motion across the network, CipherOptics makes it easy. Source : CipherOptics Resources Related to Network Security Best Practices: Competitive Read More
E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services
In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The

mobile security  Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services L. Taylor - July 12, 2000 Event Summary In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's premiere product line is their Security Vulnerability Assessment service. Market Impact By having an outside objective security Read More
Mobile Enterprise App Stores: Open for Business
This report seeks to identify the key components and the growing enterprise requirements for mobile enterprise application stores as well as the key solution

mobile security  growing enterprise requirements for mobile enterprise application stores as well as the key solution providers delivering mobile enterprise application stores. As increased mobile enterprise application adoption occurs within organizations, mobile enterprise app stores provide information technology (IT) staff with better control, management, and user segmentation of applications to employees. Read More
Spire Security
Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise

mobile security  Security Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More
Saudi Arabian Network Security Provokes Local Considerations
Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

mobile security  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into Read More
Malware Security Report: Protecting Your Business, Customers, and Bottom Line
Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line.

mobile security  Security Report: Protecting Your Business, Customers, and Bottom Line Malware is malicious software designed to attack and damage your business. Defining malware is simple, protecting against it is not. Malware can piggyback undetected in e-mails, instant messages, Web sites, and peer-to-peer connections—no organization is safe. But you can defend against malware attacks. Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line . You'll learn how cyber Read More
IT Security- What You Don't Know Can Cost You Big
In the white paper 7 essential steps to security risk reduction, you'll learn about a program that quantifies your security system's ability to han...

mobile security  Security- What You Don't Know Can Cost You Big You have a network and data security system in place. But can you measure its level of effectiveness? Or its preparedness to respond to new threats? If you can't, you're flying blind, and it could cost you. Without the ability to monitor and measure the state of your security system, you're giving up the ability to truly manage it—and that could mean the difference between failure and success. In the white paper 7 Essential Steps to Security Risk Read More
Internet Security and Acceleration Server
Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet

mobile security  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth Read More
IT Security


mobile security  Security Read More
Standard & Poor's Exposes Customers' Security
Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

mobile security  & Poor's Exposes Customers' Security Standard & Poor's Exposes Customers' Security L. Taylor - June 21, 2000 Event Summary Standard & Poor's (S&P), a division of McGraw-Hill, knowingly exposed their customers to information security vulnerabilities through their SPComstock analyst service. The security vulnerabilities, originally discovered in January, allowed customers to break into any other customer networks via their MultiCSP turnkey Linux box. The stock quote service, which is provided to Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others