| ADVANCED WORKSHOP Protecting data on your laptops [Kara Gattine, senior managing editor] In our brand new advanced workshop, independent information security expert and noted author Kevin Beaver discusses laptop security problems he sees day-in and day-out in enterprise settings. Some of these security issues you may not have considered or maybe you have been looking at from the wrong perspective. In the featured eGuide, Beaver outlines what laptop security means to your business, how to protect your valuable corporate data residing on your laptops and how laptop weaknesses are being exploited. In the featured podcast, Beaver chats with me about some serious issues every mobile manager must consider when it comes to protecting valuable data on your corporate laptops.
LEARNING CENTER WiMAX tutorial [Paul DeBeasi, senior analyst, Burton Group] As the WiMAX industry has grown, so has the hype and confusion surrounding WiMAX. Mobility managers and IT decision makers have to sort through the hype to facilitate their knowledge and understanding of WiMAX technology. Paul DeBeasi sets the stage with a broad overview of what WiMAX is and how it works. DeBeasi begins this tutorial by introducing WiMAX technology, applications and terminology. Further sections discuss WiMAX services, performance, security and devices.
| | | Ensure a safe mobile environment with mobile security policies Mobile security policies are necessary for a safe mobile environment -- and it's very important that your security policy is in place before any decisions are made as to specific solutions. So how do you define your mobile security policy? Find out now. | Two-factor authentication: Mobile security at your fingertips Two-factor authentication is more complex than using just one authentication method, but it's a lot more secure. Learn why fingerprint recognition is the key to really effective security for essentially all mobile applications with this tip from SearchMobileComputing.com. | | | |