IBM / Aberdeen Group / Endpoint / Nokia / Google / Backup Services / Virtual / IBM Managed Security Services / IBM Tivoli Endpoint / Microsoft / IBM Endpoint / /
Currency
USD / /
Facility
Ponemon Institute / /
IndustryTerm
near real-time visibility / computer operating systems / Cross-site / web applications / corporate management / owned devices / hybrid and basic mobile applications / approved applications / higher risk computing / security solution / business to business / web browser vulnerabilities / software-based keyboards / remediation services / security products / software usage patterns / desktop operating systems / mobile operating systems / security management / asset management / unprecedented real-time visibility / system software / security intelligence solutions / signed applications / specific tools / media attention / patch management / web application vulnerabilities / customer relationship management / even specialty devices / Internet connections / personal mobile devices / security intelligence tool / software assets / Social media / software-use analysis / access management solutions / web vulnerability disclosures / security services / managed security services / security technology industry / storage-intensive applications / economical solutions / mobile devices / basic client applications / configured hardware / penetration testing services / cloud computing / technology trends / restoration services / device management / mature applications / desktop computing environments / security software / software distribution / Remote device / cloud services / security solutions / internal applications / /
OperatingSystem
UNIX / VMs / Symbian / Linux / Android / BlackBerry / Microsoft Windows / /
Organization
IBM Managed Security Service / Ponemon Institute / /
Position
Manager / Manager for Mobile Devices / IBM Tivoli Endpoint Manager / leader in security research and development / midsize businesses Executive / General Business 2 Integrated IT security / /
Technology
virtual machine / CRM / facial recognition / Linux / UNIX / disk encryption / Android / Mobile device / operating system / operating systems / Mobile technology / mobile devices / voice recognition / smartphones / third-party technology / /