Mobile and wireless security

You may need to do a quick third-party registration to access certain ones.

  • Heading in the Wrong Direction with Data Protection? (Credant/Dell)
  • Leveraging rugged systems to meet the needs of your mobile computing environment
    Rugged notebooks have improved tremendously over the past few years. Companies in a wide variety of industries are using these extremely durable computers to meet their business needs. In this webcast discussion, I talk about the latest trends and features in using rugged systems for your mobile workforce
  • Data Protection for the Mobile Workforce
    Mobility is a business necessity for most organizations, with more laptops being deployed than desktops around the world. While users expect flexibility and the ability to take their data with them wherever they go, IT, Network and Security Managers need to make sure that data is protected and end user productivity is not significantly impacted in the case of a lost or stolen laptop. Attend this webcast to learn about costly mobile security mistakes that have been made within organizations. In addition, discover common pain points you can avoid, including data loss and system unavailability. Lastly, gain a better understanding of practical solutions that work and will help you achieve seamless mobile security within your organization.
  • Securing the Mobile Enterprise: Lock Down Your Wireless Data and Devices
    Despite the great potential for increased productivity that wireless networks and devices present, they also create new security risks. This webcast I co-presented with Chris Waters (CTO of Network Chemistry) details how to protect your mobile systems, critical assets, and confidential data from wireless misuse and attacks.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)


I’ve written/co-written 12 books on information security including: