Mobile Device Security Reports

Survive and Thrive: Tackling Choice, Consumerization and Cloud with BlackBerry Enterprise Server 5.0
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: In this presentation transcript, Sean McManus, RIM Director of Platform Advocacy, discusses the key trends in mobile computing today, and how to stay ahead with BlackBerry Enterprise Portfolio. View now to explore how you can effectively balance choice, security, flexibility and control over your enterprise mobile devices.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

BlackBerry

Choosing an MDM System: Fundamental Features for Success
sponsored by Fiberlink
EGUIDE: This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.
Posted: 24 May 2013 | Published: 24 May 2013

Fiberlink

IT in Europe: Taking control of smartphones: Are MDMs up to the task?
sponsored by TechTarget Security
EZINE: In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

TechTarget Security

CRM for the Professional on the Go
sponsored by BlackBerry
WHITE PAPER: Mobile CRM is something that needs to be considered now. As a business leader, you might have put it into your mental to do later box, but the reasons to make it a priority are compelling. Read this paper to discover why.
Posted: 01 Sep 2008 | Published: 25 Dec 2006

BlackBerry

MDM Software: Benefits of Mobile Configuration Management
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security

Security for BlackBerry Devices with Bluetooth Wireless Technology
sponsored by BlackBerry
WHITE PAPER: This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
Posted: 11 Aug 2006 | Published: 01 Aug 2006

BlackBerry

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013

Symantec Corporation

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

June Information Security Magazine
sponsored by TechTarget Security
EZINE: Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

TechTarget Security