Wireless LAN Security Reports

B.Y.O.D Without the Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.
Posted: 06 Jun 2012 | Published: 06 Jun 2012

Juniper Networks, Inc.

A holistic approach to your BYOD challenge
sponsored by Insight
WHITE PAPER: Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend.
Posted: 10 May 2013 | Published: 10 May 2013

Insight

An effective mobile device security policy
sponsored by TechTarget Security
EGUIDE: Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

TechTarget Security

Maximizing Smartphone Value: A Guide for IT Admins
sponsored by BlackBerry
WHITE PAPER: As an IT administrator what steps can you take to help your organization benefit the most from the mobile revolution? This guide offers practical, fresh ideas to help you lower costs, maximize benefits and map a strategy.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

BlackBerry

UT Dallas: University turns to smartphones for multi-year research project
sponsored by BlackBerry
CASE STUDY: UT Dallas’ Center for Children and Families has been conducting a study on adolescents’ social networks and their impact on development. To assist in data collection, the team chose BlackBerry® hosted solution from Ceryx based on its ability to provide a controlled environment for their research.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

June Information Security Magazine
sponsored by TechTarget Security
EZINE: Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

TechTarget Security

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron

The Transformation of Wireless Network Security
sponsored by TechTarget Security
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

TechTarget Security

Protecting Corporate Data in the "BYOD" Environment
sponsored by Apperian, Inc.
WHITE PAPER: While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.
Posted: 10 Feb 2012 | Published: 09 Feb 2012

Apperian, Inc.

Technical Guide on Mobile Security
sponsored by TechTarget Security
EGUIDE: Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security