Securing data on corporate laptops

February 05, 2009 Published by  SearchMobileComputing.com



SearchMobileComputing.com

THIS ISSUE:
  > Advanced Workshop: Protecting data on your laptops
  > Learning Center: WiMAX tutorial
  > Mobile news and advice: Can White House mobile devices be secure?


ADVANCED WORKSHOP


Protecting data on your laptops
[Kara Gattine, senior managing editor]

In our brand new advanced workshop, independent information security expert and noted author Kevin Beaver discusses laptop security problems he sees day-in and day-out in enterprise settings. Some of these security issues you may not have considered or maybe you have been looking at from the wrong perspective.

In the featured eGuide, Beaver outlines what laptop security means to your business, how to protect your valuable corporate data residing on your laptops and how laptop weaknesses are being exploited.

In the featured podcast, Beaver chats with me about some serious issues every mobile manager must consider when it comes to protecting valuable data on your corporate laptops.

LEARNING CENTER


WiMAX tutorial
[Paul DeBeasi, senior analyst, Burton Group]

As the WiMAX industry has grown, so has the hype and confusion surrounding WiMAX. Mobility managers and IT decision makers have to sort through the hype to facilitate their knowledge and understanding of WiMAX technology. Paul DeBeasi sets the stage with a broad overview of what WiMAX is and how it works.

DeBeasi begins this tutorial by introducing WiMAX technology, applications and terminology. Further sections discuss WiMAX services, performance, security and devices.


 SITE HIGHLIGHTS
Ensure a safe mobile environment with mobile security policies
Mobile security policies are necessary for a safe mobile environment -- and it's very important that your security policy is in place before any decisions are made as to specific solutions. So how do you define your mobile security policy? Find out now.
Two-factor authentication: Mobile security at your fingertips
Two-factor authentication is more complex than using just one authentication method, but it's a lot more secure. Learn why fingerprint recognition is the key to really effective security for essentially all mobile applications with this tip from SearchMobileComputing.com.

 PODCASTS & WEBCASTS
Real time enterprise mobility: Deploy killer apps for your mobile workforce
WHEN:   Available now
SPEAKER:   Stefan Andreasen, Founder and CTO, Kapow Technologies
SPONSOR:   Kapow Technologies
 
> VIEW ALL PODCASTS & WEBCASTS


MOBILE NEWS AND ADVICE


CHANNEL CHAT: Can White House mobile devices be secure?
Former White House deputy chief of staff Joe Hagin discusses mobile device security issues in this podcast, including what it takes to secure the so-called "ObamaBerry." (SearchNetworkingChannel.com)

NEWS ARTICLE: Mobile messaging and UC allow New Mexico district court system to give taxpayers their money's worth.
Mobile messaging and UC allow New Mexico district court system to give taxpayers their money's worth. (SearchUnifiedCommunications.com)

NEWS ARTICLE: Mobile UC security tricky, but IP basics help
Mobile device security is becoming a priority as unified communications goes wireless, but the move to IP can prove a boon to beleaguered administrators. (SearchUnifiedCommunications.com)





CONTACT US
Sales
For sales inquiries, please contact us at:
mlaplante@techtarget.com

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
kgattine@techtarget.com



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by SearchMobileComputing.com, a targeted Web site from TechTarget, The IT Media ROI Experts and events company.
Copyright 2009 TechTarget. All rights reserved.

If you no longer wish to receive Updates on new site content from SearchMobileComputing.com go to unsubscribe: http://searchMobileComputing.techtarget.com/u?track=NL-316&em=sekhargreen%40gmail.com&uid=4946246&eid=687515&

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
SearchMobileComputing.com
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494