Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security / Security Administration

You are using the plain HTML view, switch to advanced view for a more complete experience.

10 Essential Elements for a Secure Mobility Strategy
With enhanced mobility and work flexibility comes increased information security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn...
Stop Attacks Hiding Under the Cover of SSL Encryption
Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective...
Blue Coat's Encrypted Traffic Management Interactive E-Guide
According to Gartner, 50% of ALL network attacks will hide in SSL by 2017.SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enf...
Huddle for enterprise mobility and BYOD
While cloud providers embrace BYOD, Will Kelly looks at how the Huddle collaboration platform could provide a secure enterprise mobility and BYOD experience.
Managing the BlackBerry Transition
The BlackBerry enterprise mobile solution always included a powerful management and security platform for its devices. As you transition to multiple mobile platforms, you face a ho...
Best Practices in Choosing, Implementing and Using MDM and EMM
Mobility and security specialists are carefully considering enetrprise mobility management solutions. In this report Garner takes a look at best practices for evaluating and selec...
Huddle for enterprise mobility and BYOD
While cloud providers embrace BYOD, Will Kelly looks at how the Huddle collaboration platform could provide a secure enterprise mobility and BYOD experience.
Don't forget to add Wireshark to your security toolkit
Wireshark has been around since the late 90s and still proves to be a valuable tool for today's security conscious network administrator.
Don't forget to add Wireshark to your security toolkit
Wireshark has been around since the late 90s and still proves to be a valuable tool for today's security conscious network administrator.
Credit Card Customer Segmentation: Essential First Step for a Profitable Credit Card Customer Portfolio
Customer segmentation is one of the most fundamental building blocks in getting to know customers. It is essential for industries where customer interaction is frequent and varied,...
Post Selected Items to:

Showing 10 items of 149

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2014 NewsKnowledge