Back to Results
First PageMeta Content
Cyberwarfare / Password / Two-factor authentication / Security token / Zero-day attack / Malware / NTLM / Password manager / Wireless security / Computer network security / Computer security / Security


Securing the Mobile Enterprise
Add to Reading List

Document Date: 2013-07-10 12:25:45


Open Document

File Size: 434,76 KB

Share Result on Facebook

Company

Amazon / Adobe / CGI GROUP INC. / SafeNet / Google / /

Country

United States / /

Currency

USD / /

IndustryTerm

mobile computing / cellular communications / questionable web sites / electronic device / owned devices / unapproved software / web-based application / bank / intrusion detection systems / web browsers / security solution / appropriate applications / overalliseffective solutions / device management tools / well-designed cryptographic solution / software components / anti-malware tools / point solutions / handheld devices / mobile operating systems / corporate systems / Cloud computing / vulnerable systems / web app / encrypted data communications / Wireless Transport Wired Network / software development / cloud services / /

OperatingSystem

Android / /

Organization

U.S. government / Department of Defense / /

Position

guard / Acrobat / /

Product

one such solution / QuadroVoice / iPhone / iPad / QuadroVoice / /

ProgrammingLanguage

Java / /

Technology

cryptography / Java / firewall / smartphone / mobile computing / ATM / Smart card / Android / operating system / Mobile device / SSL / operating systems / Flash / Acrobat / mobile devices / applying all relevant operating system / /

URL

http /

SocialTag