200 Results for:Mobile Devices

  • Filter by: 

IT Security Purchasing Intentions 2013

sponsored by ComputerWeekly.com Published: 30 Nov 2012 Research Content

This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

View Now

Best Practices for Mobile Device Management

sponsored by SearchSecurity.com Published: 17 Feb 2012 eGuide

This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

View Now

Cloud-based Communications with Zoom

sponsored by Zoom Video Communications Published: 06 Feb 2019 Case Study

Download this white paper to learn about a cloud-based communications platform that can help you collaborate with remote workers by providing video and audio conferencing, collaboration, chat, and webinars across ...

View Now

Building the Right Mobile Security Toolkit

sponsored by SearchSecurity.com Published: 01 Jun 2011 eGuide

Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices ...

View Now

Mobile Device Data Protection: Key Findings and Players in the Market

sponsored by SearchSecurity.com Published: 14 Jun 2013 eGuide

This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

View Now

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

sponsored by SearchSecurity.com Published: 23 May 2012 eBook

Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and ...

View Now

A Mobile Application Management Primer for IT

sponsored by SearchSecurity.com Published: 05 Oct 2012 eGuide

This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.

View Now

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM

sponsored by SearchSecurity.com Published: 26 Mar 2013 eGuide

This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.

View Now

UC and the Evolution of Enterprise Telephony

sponsored by SearchSecurity.com Published: 18 Apr 2013 eGuide

This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with ...

View Now

How to control abuse of social networking on mobile devices

sponsored by ComputerWeekly.com Published: 25 Nov 2010 White Paper

The numbers of employees using some form of mobile technology while working has soared. The benefits to the organisation are well documented; employees are more contactable, will probably extend their working days ...

View Now