Mobile Devices Reports

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.
Posted: 15 Jun 2007 | Published: 01 Oct 2006

BlackBerry

Mobile Configuration Management Functions for Successful MDM
sponsored by TechTarget Security
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

TechTarget Security

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Mobile Security Software Keeps Corporate Data Safe
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption
sponsored by BlackBerry
WHITE PAPER: This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.
Posted: 08 Nov 2007 | Published: 08 Nov 2007

BlackBerry

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Mobilizing Lotus Domino
sponsored by Sybase iAnywhere
WEBCAST: Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.
Posted: 06 Jun 2007 | Premiered: Apr 26, 2007, 09:00 EDT (13:00 GMT)

Sybase iAnywhere

Going Mobile: Developing an Application Mobilization Plan for Your Business
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Solution is a comprehensive platform, designed to meet your organization's needs to mobilize enterprise applications and systems.
Posted: 19 Jun 2008 | Published: 01 Jun 2008

BlackBerry

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future
sponsored by Intermec
WHITE PAPER: This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future.
Posted: 12 May 2011 | Published: 12 May 2011

Intermec

Business Client Refresh ROI Estimator
sponsored by Insight
ASSESSMENT TOOL: Is it time to upgrade your old devices? Developed from industry research and insights from Intel IT, this Business Client Refresh ROI Estimator lets you explore the business value of replacing your aging PCs with new IntelĀ® processor-based devices.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Insight