Mobile Security White Papers

(View All Report Types)
Building Mobility into Your Network
sponsored by NETGEAR Inc.
WHITE PAPER: Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

NETGEAR Inc.

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

GroupLogic

Troubleshooting Wireless LANs to Improve Wi-Fi Uptime and Security
sponsored by Fluke Networks
WHITE PAPER: This whitepaper gives you an in-depth look at the wireless troubleshooting process. You'll learn how to improve security and performance by identifying rogue access points and ad-hoc networks and learn how to conduct network audits.
Posted: 21 Aug 2006 | Published: 01 Mar 2005

Fluke Networks

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013

Insight

Network Security Technologies Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

TechTarget Security

Wireless Networking: Five Questions to Start With
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012

Xirrus

Network Security Essential Guide
sponsored by TechTarget Security
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro