Handheld Computing Devices Reports

Mobile Device Management Technical Guide
sponsored by TechTarget Security
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

DellEMC and Intel®

Your Guide to Mobile Application Management
sponsored by TechTarget Security
EGUIDE: This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

TechTarget Security

Do Mobile Users Need Full Desktop Access?
sponsored by VMware, Inc.
EGUIDE: In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Mobile Social Networking and the Next Generation of Handheld Devices
sponsored by BlackBerry
WHITE PAPER: This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

BlackBerry

CIO Perspective: BlackBerry Security
sponsored by BlackBerry
WHITE PAPER: In this question and answer session, learn how Dr. John D. Halamka. MD, of the Harvard Medical School, depends on a BlackBerry Solution to keep his patient and student records secure.
Posted: 08 Nov 2006 | Published: 19 Oct 2006

BlackBerry

Understanding Consumer Device Management and BYOD
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

TechTarget Security

Mobilizing Lotus Domino
sponsored by Sybase iAnywhere
WEBCAST: Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.
Posted: 06 Jun 2007 | Premiered: Apr 26, 2007, 09:00 EDT (13:00 GMT)

Sybase iAnywhere

Bring Your Own iPad to Work
sponsored by Aruba Networks, Inc.
WHITE PAPER: Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Aruba Networks, Inc.