200 Results for:Mobile Devices

  • Filter by: 

Building the Right Mobile Security Toolkit

sponsored by SearchSecurity.com Published: 01 Jun 2011 eGuide

Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices ...

View Now

IT Security Purchasing Intentions 2013

sponsored by ComputerWeekly.com Published: 30 Nov 2012 Research Content

This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

View Now

How to control abuse of social networking on mobile devices

sponsored by ComputerWeekly.com Published: 25 Nov 2010 White Paper

The numbers of employees using some form of mobile technology while working has soared. The benefits to the organisation are well documented; employees are more contactable, will probably extend their working days ...

View Now

UC and the Evolution of Enterprise Telephony

sponsored by SearchSecurity.com Published: 18 Apr 2013 eGuide

This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with ...

View Now

Best Practices for Mobile Device Management

sponsored by SearchSecurity.com Published: 17 Feb 2012 eGuide

This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

View Now

Essential Guide to API Management and Application Integration

sponsored by SearchBusinessAnalytics Published: 19 Nov 2013 Essential Guide

Explore your API options in this essential guide with tips from experts including Alex Gaber, API evangelist. Check out a range of stories that highlight examples of successful API management, trends with the ...

View Now

A Mobile Application Management Primer for IT

sponsored by SearchSecurity.com Published: 05 Oct 2012 eGuide

This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.

View Now

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM

sponsored by SearchSecurity.com Published: 26 Mar 2013 eGuide

This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.

View Now

Mobile Device Data Protection: Key Findings and Players in the Market

sponsored by SearchSecurity.com Published: 14 Jun 2013 eGuide

This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

View Now

Discover the Risks and Rewards Behind a Mobile Workforce

sponsored by SearchSecurity.com Published: 22 Apr 2013 eGuide

Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

View Now