mSecurity Reports

PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs
sponsored by Dell and VMware
CASE STUDY: Learn how one firm improved diaster recovery efforts with virtualization and cut energy costs by 40%.
Posted: 10 Sep 2013 | Published: 31 Aug 2013

Dell and VMware

SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
sponsored by TechTarget Security
EGUIDE: This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
Posted: 10 May 2012 | Published: 09 May 2012

TechTarget Security

Computer Weekly - 15 May 2012: Overhauling banking IT
sponsored by TechTarget ComputerWeekly.com
EZINE: This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?
Posted: 14 May 2012 | Published: 15 May 2012

TechTarget ComputerWeekly.com

WLAN Planning For BYOD
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

TechTarget Security

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks

Mobile Applications Before and After
sponsored by AT&T Corp
ESSENTIAL GUIDE: This white paper takes a look at business processes before and after the use of mobile applications.
Posted: 04 Oct 2011 | Published: 04 Oct 2011

AT&T Corp

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Expert Discussion: Mobile device security in health care
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

Hewlett Packard Enterprise

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security