mSecurity Reports

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Mobile Device Security Overview
sponsored by TechTarget Security
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

TechTarget Security

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

TechTarget Security

E-Guide: Best Practices to ensure secure mobile communication
sponsored by TechTarget Security
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Symantec Corporation

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by TechTarget Security
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

TechTarget Security

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks