White Papers: mobile security


Sort by: Date | Company | Title


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


Together at Last: BYOD and Solid Security
By Good Technology | 13/2/2014
Employees want to use their own mobile devices, which is often met with IT resistance. But there’s no need for conflict! Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to BYOD, while still providing rock-solid enterprise security.
Download this now


Closing the Circle: How to get manageable endpoint, mobile device and web security together
By Webroot | 7/1/2014
Closing the circle: Why you need to protect endpoints and mobile devices together Endpoint protection has gotten more complicated In this white paper we will discuss: • Why traditional endpoints and mobile devices require overlapping (but not identical) security solutions. • How to enhance the protection of all endpoints by adding web security. • Why today’s threats require that endpoint protection and mobile device protection activities be moved to the cloud. • How Webroot makes it easy to “close the circle” by managing endpoint protection, mobile device protection and web security through one infrastructure.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia