Wireless Handheld Devices Reports

BlackBerry for Healthcare
sponsored by BlackBerry
PRODUCT LITERATURE: Read why BlackBerry is the leading wireless solution for keeping healthcare professionals connected to colleagues, patient details and medical information so they can provide higher quality patient care throughout the day.
Posted: 08 Nov 2007 | Published: 01 Jan 2004

BlackBerry

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Mobile Device Management Live Chat
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

TechTarget Security

E-Book: Taking Mobile CRM Beyond the Sales Force
sponsored by Sybase, an SAP company
EBOOK: Mobility was going to be "the next big thing" in CRM but didn’t pan out, with "road warriors" frustrated with user interfaces meant for a PC. But the success of smart phones has changed the game. This e-book helps enterprises understand the marketplace for devices, applications and managing it all in order to create a mobile CRM program.
Posted: 14 Sep 2010 | Published: 13 Sep 2010

Sybase, an SAP company

Best Practices for Managing and Understanding Mobile Authentication
sponsored by TechTarget Security
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

TechTarget Security

Making Sense of the Wireless World - BlackBerry for Wireless LAN
sponsored by BlackBerry
WHITE PAPER: This white paper reviews past and present technologies including a discussion of circuits and packets and also compares WLAN and WWAN networks in terms of advantages, challenges, and issues to consider when considering a wireless solution.
Posted: 05 Feb 2006 | Published: 01 Jan 2005

BlackBerry

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

DellEMC and Intel®

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software