Protecting the End-Points

By Baselinemag  |  Posted 2007-08-14 Print this article Print

As mobile devices get smaller, become more widespread and harbor an increasing amount of business data, I.T. executives are using new strategies and software tools to keep these devices secure. Story Guide:

Lead Story: How To Secure Mobile Devices
As enterprisewide mobile security policy involves a delicate balancing act between cost, management, risk assessment and regulatory compliance.

Vendor Profiles

  • Citrix Systems: Versatile Tools
  • Credant Technologies: A Unique Style of Encryption
  • Symantec: Expanding Its Reach


    Project Pointers
    Tips for setting up your own mobile strategy.


    Submit a Comment

    Loading Comments...
    eWeek eWeek

    Have the latest technology news and resources emailed to you everyday.

    By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

    Click for a full list of Newsletterssubmit