Wireless LAN Security Reports

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

GroupLogic

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Network Security Essential Guide
sponsored by TechTarget Security
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE: This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Survive and Thrive: Tackling Choice, Consumerization and Cloud with BlackBerry Enterprise Server 5.0
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: In this presentation transcript, Sean McManus, RIM Director of Platform Advocacy, discusses the key trends in mobile computing today, and how to stay ahead with BlackBerry Enterprise Portfolio. View now to explore how you can effectively balance choice, security, flexibility and control over your enterprise mobile devices.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

BlackBerry

Expert Discussion: Mobile device security in health care
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

Hewlett Packard Enterprise

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security