Best practices for wireless security and management

Tuesday, 23 August 2005, 1:51 PM EST

Deploying and managing wireless applications while ensuring end-to-end security of the overall system can be daunting. Installing server and desktop software and keeping handhelds up-to-date can be a time sink as handheld use increases. And consideration must be given to ensuring end-to-end security across your firewall, over-the-air, and on the handhelds themselves.

Learn best practices for deploying, managing, and securing enterprise wireless handheld fleets.

At net-security.bitpipe.com, free registration required.

[ Read more ]




Spotlight

How safe are Android-based children’s tablets?

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Feb 26th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //