Handheld Computers Reports

Mobile Security Software Keeps Corporate Data Safe
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future
sponsored by Intermec
WHITE PAPER: This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future.
Posted: 12 May 2011 | Published: 12 May 2011

Intermec

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Making Sense of the Wireless World - BlackBerry for Wireless LAN
sponsored by BlackBerry
WHITE PAPER: This white paper reviews past and present technologies including a discussion of circuits and packets and also compares WLAN and WWAN networks in terms of advantages, challenges, and issues to consider when considering a wireless solution.
Posted: 05 Feb 2006 | Published: 01 Jan 2005

BlackBerry

The CIO's Guide to Mobile Applications
sponsored by BlackBerry
WHITE PAPER: Read this white paper to learn about some of the key enterprise LOB applications that most benefit from mobility and how applications can be deployed with a simple implementation guideline.
Posted: 12 Feb 2006 | Published: 07 Apr 2010

BlackBerry

Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange
sponsored by BlackBerry
WHITE PAPER: This document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.
Posted: 22 Jun 2009 | Published: 18 Mar 2009

BlackBerry

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Mobile Device Management: Fundamental steps for success
sponsored by TechTarget Security
WHITE PAPER: This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
Posted: 29 May 2013 | Published: 29 May 2013

TechTarget Security

A Mobile Application Management Primer for IT
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

TechTarget Security

Mobile Device Management Live Chat
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

TechTarget Security