39 Results for:Mobile Applications

  • Filter by: 

Mobile location-based services gaining ground

sponsored by ComputerWeekly.com Published: 24 Nov 2010 White Paper

From the turn of the millennium until the end of 2007 MLBS (Mobile Location Based Services) had promised much, but delivered very little in terms of commercial applications. Even in Japan and South Korea, the most ...

View Now

Your Guide to Mobile Application Management

sponsored by SearchSecurity.com Published: 19 Oct 2012 eGuide

This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice ...

View Now

Enterprise Device Management: A Brave New World

sponsored by SearchSecurity.com Published: 06 Feb 2012 eGuide

Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.

View Now

Information Security Essential Guide: Strategies for Tackling BYOD

sponsored by SearchSecurity.com Published: 31 May 2013 White Paper

Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs ...

View Now

The Global State of Enterprise Mobility 2014/15

sponsored by ComputerWeekly.com Published: 05 Jan 2015 Research Content

An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

View Now

Airline Stops Automated Attacks on Web & Mobile

sponsored by Shape Security Published: 20 Aug 2019 Case Study

A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop ...

View Now

Managing Android devices in the enterprise

sponsored by ComputerWeekly.com Published: 04 Aug 2016 eBook

This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

View Now

Securing the Mobile and API Connected Work Space: Evernote Case Study

sponsored by Data Theorem Published: 18 Sep 2019 Video

Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful ...

View Now

Live Threat Briefing New Attack Trends in Retail

sponsored by Shape Security Published: 19 Aug 2019 Webcast

Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.

View Now

In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps

sponsored by Arxan Published: 30 Apr 2019 Analyst Report

This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research ...

View Now