Home
 > Research and Reports > White Papers > Mobile Security and Responsibility

Mobile Security and Responsibility

Source: Quocirca Ltd
When companies extend their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in the briefcases of users. Business processes may run more efficiently, and there may be more flexibility in working practices, but this is of little benefit if attitudes to IT use are complacent or irresponsible.


Featured publications:

ExecBlueprints: Balancing Security and Convenience: Key Strategies for Creating a Safe and Efficient Infrastructure
Source: Skillsoft As technology choices have multiplied and IT’s importance to organizations has grown, more IT leaders are involved in understanding the needs of the business and participating in discussions concerning risk and reward. This white paper offers an overview of current issues that IT faces as it navigates this tricky terrain. Read More...
ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow
Source: Skillsoft Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.   Read More...
Best Practices in Mobile Workforce Management
Source: ViryaNet How can you address the full lifecycle of mobile workforce management and continuously achieve your operational goals? Keep in mind these best practices in planning, executing, and monitoring. Read More...


You may also be interested in these related documents:

Mobile Access Security & Management
Source: Ericom Software Inc. The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been further complicated by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices. Read More...
Top 5 Mobile Security Threats
Source: Ziff Davis While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More...
Enterprise Mobile Security: Protecting Mobile Data and Increasing Productivity
Source: Trend Micro, Incorporated Today’s mobile devices improve productivity and efficiency, but they also bring new risks to companies: confidential corporate and personal data can be lost or subject to other threats. Mobile device security management should consider a combination of people, processes, and technology. Learn about current security issues and actionable mobile security best practices so you can mitigate the risks your company is facing. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.