Skip the navigation

Mobile Security White Papers

Mobile Security white papers and technology resources for implementing and optimizing Mobile Security strategy, solutions, Mobile Security products, and more.

Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility

This white paper from Enterprise Management Associates (EMA) discusses the unique challenges of managing mobile, desktop, and server endpoints in SMB-sized organizations. EMA offers pragmatic solutions and reviews IBM Endpoint Manager's ability to address the needs of these organizations.

Sponsor: IBM


 

Improve Your Mobile Application Security with IBM Worklight

IBM® Worklight helps organizations extend their business across multiple mobile devices. It provides an open, comprehensive and advanced mobile application platform to help quickly and cost effectively build, run and manage mobile applications.

Sponsor: IBM


 

Top 3 Iron-Clad Reasons Why File Sync/Share is Not Endpoint Backup

The user-driven adoption of consumer-based syncing and sharing productivity tools runs rampant in today's enterprise. Employees unknowingly create corporate data security risks by adopting these applications. Understanding the primary purpose of each application helps differentiate between them.

Sponsor: Code42


 

Security Technologies for Mobile and BYOD

With mobile malware growing in volume and sophistication, companies need to ensure that the use of mobile devices and BYOD doesn't compromise the security of confidential business data and mission-critical systems.

But with so many security technologies available, how do you sort through the options and pick the solutions that will really work for your business?

Sponsor: Kaspersky


 

Know the Big Three

How do you protect your mobile applications? Check out this whitepaper on three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.

Sponsor: HP


 

Designing a defense for mobile apps

Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications-from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.

Sponsor: HP