193 Results for:Mobile Devices

  • Filter by: 

Building the Right Mobile Security Toolkit

sponsored by SearchSecurity.com Published: 01 Jun 2011 eGuide

Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices ...

View Now

Essential Guide to API Management and Application Integration

sponsored by SearchBusinessAnalytics Published: 19 Nov 2013 Essential Guide

Explore your API options in this essential guide with tips from experts including Alex Gaber, API evangelist. Check out a range of stories that highlight examples of successful API management, trends with the ...

View Now

Discover the Risks and Rewards Behind a Mobile Workforce

sponsored by SearchSecurity.com Published: 22 Apr 2013 eGuide

Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

View Now

CW Buyer's Guide: Healthcare in IT

sponsored by ComputerWeekly.com Published: 21 Sep 2012 Analyst Report

This 7 page buyer's guide looks at the future of electronic healthcare records, healthcare technology and the use of mobile technology.

View Now

Mobile Device Data Protection: Key Findings and Players in the Market

sponsored by SearchSecurity.com Published: 14 Jun 2013 eGuide

This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

View Now

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

sponsored by SearchSecurity.com Published: 20 Nov 2012 Presentation Transcript

Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

View Now

A Mobile Application Management Primer for IT

sponsored by SearchSecurity.com Published: 05 Oct 2012 eGuide

This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.

View Now

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM

sponsored by SearchSecurity.com Published: 26 Mar 2013 eGuide

This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.

View Now

Marketing strategies to improve customer understanding

sponsored by SearchCRM Published: 19 Jun 2012 eGuide

In our customer-centric market, the voice of the consumer is having a major effect on day-to-day business decisions. This expert e-guide reveals tips and advice to help readers utilize marketing strategies to best ...

View Now

The future of work: Expections of the next-generation workforce

sponsored by ComputerWeekly.com Published: 21 Sep 2011 IT Briefing

This report from Cisco provides insight into the mindset, expectations and behaviour of the world's next generation of workers and what this will mean for businesses in preparing to accommodate the demands of this ...

View Now