Wireless Security White Papers

Results 1 - 25 of 289Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco, remote access, remote network management, wireless security, total cost of ownership, configuration management
    
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention, ssl, wireless security, data protection
    
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security, data protection, business technology, mobile device management
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control, email security, hacker detection, mobile workers, smart phones, wireless security, data protection, desktop management, cloud computing, business technology, mobile device management
    
By: ThousandEyes     Published Date: Jan 14, 2018

ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.

Tags : thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
    
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security, it spending, email archiving, vulnerability management, business technology
    
By: Kaspersky     Published Date: Feb 06, 2017

Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.

Tags : kaspersky, cyber crime, data loss, business security, network security, email security, hacker detection, internet security, security policies, wireless security, best practices, data protection, email archiving
    
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
    
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016

This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.

Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity, network security, authentication, identity management, password management, wireless security, data protection, records management, data loss prevention
    
By: Cambium Networks     Published Date: Oct 03, 2016

What’s the catalyst behind this astonishing growth? There’s little question that one of the prime drivers — perhaps the most important of all — is the meteoric rise of reliable, high quality, cost-efficient wireless broadband video surveillance networks.

Tags : video surveillance, security, wireless broadband, safety, video camera, wireless security
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls, hacker detection, data protection, mobile device management, data loss prevention
    
By: Kaspersky     Published Date: Jul 22, 2016

Learn how you can maximize the performance and security of your virtualized machines.

Tags : kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention, wireless security, server virtualization, data loss prevention
    
By: Kaspersky     Published Date: Jul 22, 2016

Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?

Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones, wireless messaging, wireless security, data protection, collaboration, messaging, data loss prevention
    
By: MobileIron     Published Date: May 23, 2016

Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415

Tags : security, mobileiron, best practices, windows, device management, identity management, security management, mobile computing, wireless phones, wireless security, mobile device management
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control, encryption, hacker detection, intrusion prevention, wireless security, data protection, mobile device management
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, network security, email security, firewalls, hacker detection, internet security, intrusion prevention, security policies, wireless security, return on investment, business technology, data loss prevention
    
By: IBM     Published Date: Apr 04, 2016

Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.

Tags : ibm, mobile, mobility, mobile risk mitigation, security, mobile computing, mobile data systems, wireless security
    
By: IBM     Published Date: Apr 04, 2016

In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.

Tags : ibm, mobile security, mobile security maturity, ismg, security, mobile computing, mobile data systems, wireless security
    
By: IBM     Published Date: Apr 04, 2016

When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?

Tags : ibm, ciso, mobility, mobilephobia, mobile security, security, mobile computing, mobile data systems, wireless security
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management, mobile application management, mobile content management and more

Tags : citrix, xenmobile, mobile, security, mobile device management, mobile app management, mobile content management, secure instant messaging, wireless infrastructure, wireless messaging, wireless phones, wireless security, collaboration, messaging, secure content management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.

Tags : citrix, enterprise, application, enterprise, network security, access control, mobile computing, mobile workers, smart phones, wifi, wireless communications, wireless messaging, wireless phones, wireless security, collaboration, secure content management, desktop management, mobile device management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.

Tags : citrix, sharefile, enterprise, security, email security, internet security, mobile computing, smart phones, wireless communications, wireless messaging, wireless phones, wireless security, data protection, collaboration, content delivery, content integration, secure content management, mobile device management, data loss prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.

Tags : citrix, security, mobile, password management, mobile computing, mobile workers, wireless phones, wireless security, risk management, productivity, mobile device management, data loss prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.

Tags : citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security, email security, hacker detection, mobile computing, smart phones, wifi, wireless phones, wireless security, data protection, collaboration, secure content management, mobile device management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End