device security

Results 226 - 250 of 491Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 is the best Windows yet, and at Microsoft, we are excited to deliver innovative Windows 10 experiences across a wide variety of world-class devices. Get the most out of Windows 10 with innovative hardware form factors that boost user productivity while reducing security risks—delivering more value at every price point. Download this buyer's guide to discover which Windows 10 Pro devices are right for your business.
Tags : 
    
Microsoft Windows
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Mobility Helps Enterprises Enter a New Age
Tags : 
entrust, mobile, mobility, secure mobile assets, mobile devices, mobile device security, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Know the truth: Mobile devices more secure than traditional PCs
Tags : 
entrust, mobile devices, mobile, security, mobile security, mobile perception
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : 
entrust, security, mobile security, infographic, malware, mobile devices
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
Part 3 - Free security testing tools for Windows handheld devices. With these no-cost security testing tools, you can check network security from Windows handheld devices.
Tags : 
microsoft, windows phone, mobile security, free security testing tool, networking, wireless network connection, smart phones, pdas
    
Microsoft Windows Phone
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses how mobile devices accessing enterprise data can pose security risks.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, malware, mobile antivirus, data encryption, ibm
    
PC Mall
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention
    
PC Mall
Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls, risks, solutions, endpoint, endpoint management, network security, contorls, requirements, best practices
    
Palo Alto Networks
Published By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, information security, desktop virtualization, virtualization, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2015
Empowering people to use Windows applications and native mobile apps on any type of device—with full security.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
Simple, secure ways to deliver a great experience for remote users. As mobile workstyles transform the way people and businesses work, remote access is becoming more important than ever. In enabling people to work anywhere, on any device, you need to meet IT’s requirements for security and manageability—but it’s just as important to consider user experience. Citrix, a leader in mobile workstyles, has long recognized that remote access has to address the needs of users as well as IT. With an entire team dedicated to user experience, Citrix has developed secure-by-design remote access solutions that make it simple for people to work the way they choose, anywhere and on any device, to deliver optimal productivity and business impact for their organizations
Tags : 
network management, network secuirty, network optimization, information technology, best practices
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network, networking, knowledge management, data management, business technology, data center
    
ForeScout
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee