191 Results for:Mobile Devices

  • Filter by: 

Building the Right Mobile Security Toolkit

sponsored by SearchSecurity.com Published: 01 Jun 2011 eGuide

Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices ...

View Now

Cloud-based Communications with Zoom

sponsored by Zoom Video Communications Published: 06 Feb 2019 Case Study

Download this white paper to learn about a cloud-based communications platform that can help you collaborate with remote workers by providing video and audio conferencing, collaboration, chat, and webinars across ...

View Now

Essential Guide to API Management and Application Integration

sponsored by SearchBusinessAnalytics Published: 19 Nov 2013 Essential Guide

Explore your API options in this essential guide with tips from experts including Alex Gaber, API evangelist. Check out a range of stories that highlight examples of successful API management, trends with the ...

View Now

Discover the Risks and Rewards Behind a Mobile Workforce

sponsored by SearchSecurity.com Published: 22 Apr 2013 eGuide

Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

View Now

Mastering multi-channel journeys – making engagement pay

sponsored by ComputerWeekly.com Published: 23 Sep 2015 Research Content

This research from Oxygen8 assesses how businesses communicate with customers and how those customers want businesses to communicate with them, and offers advice on how to achieve it.

View Now

CW Buyer's Guide: Healthcare in IT

sponsored by ComputerWeekly.com Published: 21 Sep 2012 Analyst Report

This 7 page buyer's guide looks at the future of electronic healthcare records, healthcare technology and the use of mobile technology.

View Now

Mobile Device Data Protection: Key Findings and Players in the Market

sponsored by SearchSecurity.com Published: 14 Jun 2013 eGuide

This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

View Now

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

sponsored by SearchSecurity.com Published: 20 Nov 2012 Presentation Transcript

Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

View Now

A Mobile Application Management Primer for IT

sponsored by SearchSecurity.com Published: 05 Oct 2012 eGuide

This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.

View Now

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM

sponsored by SearchSecurity.com Published: 26 Mar 2013 eGuide

This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.

View Now