mSecurity Reports

The development of wired and wireless LANs in a hybrid work model
sponsored by TechTarget ComputerWeekly.com
EBOOK: Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

Information Security Magazine: August Issue
sponsored by TechTarget Security
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

TechTarget Security

Best Practices for mobile authentication
sponsored by TechTarget Security
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

TechTarget Security

Maximizing Smartphone Value: A Guide for IT Admins
sponsored by BlackBerry
WHITE PAPER: As an IT administrator what steps can you take to help your organization benefit the most from the mobile revolution? This guide offers practical, fresh ideas to help you lower costs, maximize benefits and map a strategy.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

BlackBerry

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

IM Wireless Network Assessment
sponsored by Ingram Micro
ASSESSMENT TOOL: The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Ingram Micro

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by TechTarget Security
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

TechTarget Security

Presentation Transcript: The New Branch Office - Simply Connected
sponsored by Juniper Networks, Inc.
PRESENTATION TRANSCRIPT: This is a presentation transcript of a webcast dedicated to learning about branch offices: the challenges, solutions, and how to keep them secure.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Juniper Networks, Inc.