mSecurity Reports

The development of wired and wireless LANs in a hybrid work model
sponsored by TechTarget ComputerWeekly.com
EBOOK: Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions
sponsored by TechTarget Security
EGUIDE: Read this e-guide from our experts at SearchNetworking.com to gain a better understanding of WLAN solutions and how to evaluate them. Inside you'll find critical questions you should ask when exploring solutions as well as a discussion about the myths surrounding cloud-managed WLANs.
Posted: 20 May 2013 | Published: 20 May 2013

TechTarget Security

Best Practices for mobile authentication
sponsored by TechTarget Security
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

Malware Hitching a Ride on Mobile Apps?
sponsored by TechTarget Security
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

TechTarget Security

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

IM Wireless Network Assessment
sponsored by Ingram Micro
ASSESSMENT TOOL: The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Ingram Micro

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.