Home >
> Wireless Security |
|
|
|
|
|
Results 1 - 25 of 47 matches |
Sort Results By : Published Date | Title | Company name |
|
The CIO's Guide to Fixed Mobile Convergence |
|
Mobile working has transformed the business world, stimulating innovation, improving productivity and creating new opportunities. Industry analyst estimates suggest the mobile workforce could exceed 800 million in 2009. These workers can spend as much as 40% of their time away from their desk, complicating their communication needs and draining productivity. As businesses look to do more and encourage the best from their workforce, flexible, on-demand access to information has become a requirement.
Download Now
|
|
|
|
Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach |
|
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Download Now
|
|
|
|
Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets |
|
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won’t do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Download Now
|
|
|
|
When Encryption Is Not Enough |
|
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Download Now
|
|
|
|
Applications, Virtualization and Devices: Taking Back Control |
By : Sophos |
Published Date: Aug 13, 2008 |
|
Employees installing legitimate but unauthorized applications, are a real and growing threat to business security and productivity. Removable storage media and wireless protocols make the challenge of securing data even more complex. This paper explains why control is important and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.
Download Now
|
|
|
|
Securing Data on Laptops: Why Encryption Isn't Enough |
|
Missing laptops and mobile devices continue to be the number one cause of data breaches. Research indicates that over 60% of data breaches are caused by careless employees or insider theft. This white paper provides a case for endpoint security that remains effective regardless of end-user reliability.
Download Now
|
|
|
|
The Human Factor in Laptop Encryption |
|
This Ponemon Institute whitepaper examines the behavior of non-IT employees when it comes to encryption policy. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Download Now
|
|
|
|
|
Best Practices: LAN Security and 802.1X |
|
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Download Now
|
|
|
|
|
|
Wired + Wireless: Smart Planning for New Network Infrastructures |
By : Belden |
Published Date: Apr 16, 2009 |
|
This paper provides recommendations and tips for accomplishing this by discussing: considerations for the wiring closet, identification of all network requirements, trends and tools for planning the placement of Access Points, decision factors to consider for combined networks, technology trends and standards, power level requirements, cable deployment and many other factors that impact the optimization of performance and reliability of combine wired and wireless networks. Learn more today!
Download Now
|
|
|
|
|
Enable Your Mobile Workforce without Putting Your Data at Risk |
By : McAfee |
Published Date: Aug 08, 2008 |
|
As the global workforce becomes increasingly mobile, it's more important than ever to prevent that workforce from becoming a liability to your organization. If just one employee loses a laptop, USB drive, or handheld device or uses sensitive data in unintended ways, your entire company could risk a highly public breach incident. In this environment you need new breeds of security applications to help shield your organization and employees from the latest mobile threats.
Download Now
|
|
|
|
|
MobilePass - Authenticating Users on the Go! |
|
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Download Now
|
|
|
|
Securing Mobile Connectivity with Two-Factor Authentication |
|
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Download Now
|
|
|
|
|
Good Architecture and Security |
|
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Download Now
|
|
|
|
|
|
Safeguard Data Loss |
By : Utimaco |
Published Date: Mar 12, 2007 |
|
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Download Now
|
|
|
|
The Enterprise Mobile Messaging Benchmark Report |
|
In this report, Aberdeen takes an in-depth look at how best-in-class organizations are using mobile messaging to improve productivity and customer service. They also define the steps that can help your organization deploy a best-in-class enterprise mobile messaging solution.
Download Now
|
|
|
|
Enterprise Mobile Adoption |
|
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Download Now
|
|
|
|
|
|
|
|
|
Results 1 - 25 of 47 matches |
Sort Results By : Published Date | Title | Company name |
Home >
> Wireless Security |
|
<< Start < Previous 1 2 Next > End >>
|
More Wireless Topics |
802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN |
|
|
|