secure apps

Results 76 - 86 of 86Sort Results By: Published Date | Title | Company Name

The State of Mobile Application Insecurity - Ponemon Institute Research Report

Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless
    
IBM MaaS360

Say Yes to Cloud Apps

Published By: IBM     Published Date: Jan 07, 2016
Be the “Yes Guy” in IT with IBM Cloud Security Enforcer and expand secure adoption of cloud apps in the enterprise.
Tags : 
ibm, cloud, apps, security, protection, enterprise applications, business technology
    
IBM

Infuse identity across all applications and endpoints

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.
Tags : 
    
Group M_IBM Q418

Why BlackBerry 10 Raises the Bar in Enterprise Security

Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations, knowledge management, enterprise applications, business technology
    
BlackBerry

Motorola Makes Desktops Secure with AppSense URM

Published By: AppSense     Published Date: Nov 26, 2012
This case study demonstrates how AppSense Application Manager is transparent to end-users, unobtrusive for administrators, and requires extremely little administration.
Tags : 
user experience, end-point users, appsense, application management, application manager, desktop security, end user experience, access control, application performance management, desktop management, business technology
    
AppSense

Top 10 Reasons why a comprehensive User Rights Management strategy matters

Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management, storage management, access control, application security, compliance, intrusion detection, mobile computing, mobile workers, total cost of ownership, windows, windows server, web service management, employee performance
    
AppSense

EMM Real Benefits in Today's Mobile World

Published By: VMware     Published Date: Feb 24, 2017
The economy isn't standing still. For your business to succeed, your employees shouldn't either. With your network infrastructure as a strong pair of legs, the right combination of a seamless user experience and a secure workspace will give users -- and your organization -- the ability to move forward with mobility. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Tags : 
    
VMware

Protecting Android™ Applications with Secure Code Signing Certificates

Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec, application security, security policies, mobile device management
    
Symantec Corporation

Protecting Android™ Applications with Secure Code Signing Certificates

Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation

How embracing technology can boost your company’s bottom line

Published By: Citrix ShareFile     Published Date: Oct 04, 2019
For emerging businesses, investing in the right technology can accelerate their growth and enhance their bottom lines. As more companies expand their workspaces with virtual teams and work-from-home policies, a good first step is to invest in a secure, flexible content collaboration solution—one that is easy to integrate and use. It should give you and your teams secure access to files, apps, and data from any device and any location to accelerate productivity. Not all file sharing solutions are the same. Download our white paper to determine if a modern content collaboration platform can help you: • Streamline workflows • Improve operational efficiencies • Make the organization more secure and compliant • Deliver the desired ROI
Tags : 
    
Citrix ShareFile

The State Of Mobile Application Insecurity - Ponemon Institute Research Report

Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.