ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device ManagementResearch

  • CYOD: Hassle Free BYOD

    Sponsored by: Insight

    This informative resource discusses a new approach to BYOD where employees choose their own device from a menu of pre-approved devices and plans, helping ease the burden of management for IT and allowing for improved efficiency.

  • Hightail for Enterprise: Overview

    Sponsored by: Hightail

    The following white paper explores a file sharing software that allows virtually everyone in the business to be more productive. Also learn how this solution can allow for better control and security of your data. Read on to find out more.

  • Mobility Management Selection Guide

    Sponsored by: Citrix

    This crucial white paper takes an in-depth look at the criteria you can use to choose the best enterprise mobility management system for your organization’s specific needs.

  • Bringing System Management to Messaging & Collaboration

    Sponsored by: ComputerWeekly.com

    The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.

  • HIPAA Compliance in a BYOD Environment

    Sponsored by: Imprivata

    Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.

  • Avoid HIPAA Compliance Violations Amid the Rise of BYOD

    Sponsored by: Imprivata

    This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.

  • Secure Virtual Desktop Infrastructure for HIPAA Compliance

    Sponsored by: Imprivata

    This white paper explores the benefits of a virtual desktop infrastructure (VDI) for healthcare facilities trying to implement mobile devices for improved secure patient data access.

  • Webinar: Developing a User-Centric Secure Mobile Strategy: It's in Reach

    Sponsored by: IBM

    Join mobile and social content management experts Cengiz Satir and Ian Story from IBM in a roundtable discussion with Karen Bannan, Contributing Editor from InformationWeek as they dive into what it takes to make a BYOD initiative successful.

  • Mobile Threat Report 2014

    Sponsored by: Webroot

    The Webroot® Mobile Threat Report provides an overview of the risks and trends of the mobile space, based on research and analysis conducted by the Webroot Mobile Threat Research team.

  • Organizational Development and Testing

    Sponsored by: Borland, Micro Focus

    Application development isn't as simple as it was in the past, when businesses just had to worry about PCs. Tune in to this podcast to explore the challenges many organizations face when it comes to mobile development, discover best practices for dev and test, and learn about the tools you need for success.

  • Intelligent Imaging for Improved Banking Performance and Profitability

    Sponsored by: IBM

    The following white paper explores how intelligent document imaging solutions can help banks enable a mobile-friendly environment. Get a firsthand look at how this technology can virtually eliminate the reliance on paper documents, improve productivity, reduce customer attrition, and more.

  • 2013 BYOD and Mobile Security Report

    Sponsored by: Lumension

    This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.

  • Taking Managed Security Services To The Next Level

    Sponsored by: Webroot

    This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.

  • Cash in on Today’s Exploding Mobile Market

    Sponsored by: Mashery

    Now that consumers and businesses must embrace the proiliferation of mobile technologies, your company is presented with a great opportunity.

  • Enterprise MDM: Managing the Mobile Communications Revolution

    Sponsored by: Apptix

    This informative white paper examines an MDM solution designed to improve mobile performance and reduce risk all while cutting costs.

  • Design Security Policies For #GenMobile

    Sponsored by: Aruba Networks

    This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.

  • BYOD in the Enterprise: A Guide for CIOS

    Sponsored by: ZixCorp

    This exclusive resource discusses key policy considerations for CIOs who want to design and launch a successful BYOD program.

  • Real-Time Analytic Mobile Application

    Sponsored by: Workday

    Watch this concise webcast to uncover all the ins-and-outs of the real-time analytic mobile application.

  • Top 10 Considerations when Selecting a Secure Text Messaging Solution

    Sponsored by: TigerText, Inc.

    This resource offers tips on how to choose a text messaging vendor that offer secure and compliant functionality for use in the workplace.

  • Tips To Improve The Mobile App Experience Over Wi-Fi

    Sponsored by: Aruba Networks

    This informative white paper discusses how, with a little upfront planning and some smart technology, you can significantly improve the quality of your users' mobile application experience on corporate Wi-Fi networks.

  • Create A Rock-Solid Wi-Fi Foundation For #GenMobile

    Sponsored by: Aruba Networks

    This informative paper examines the steps your business can take to build your wireless network into an enterprise asset for the mobile workforce.

  • Testing Times in a Mobile World

    Sponsored by: Borland, Micro Focus

    In this infographic, check out eye-opening stats on the state of mobile apps and technology today, and discover a low-effort, high-ROI way to manage mobile development, testing, and delivery.

  • Computer Weekly Special Report on VDI

    Sponsored by: ComputerWeekly.com

    Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility management. Brian is responsible for both "The VDI Delusion" and "Desktops as a Service" books – considered to be the most reliable sources of information on battling today's technology pain points bring you this special report.

  • Health Insurance Association Launches a Security & Integration Cloud Services Brokerage

    Sponsored by: Mashery

    Read how BCBSA implemented a "mediation layer" that simplified security, integration and aggregation of healthcare information, while enabling users with mobile devices to access this information.

  • Next Generation Authentication for the Mobile Ready Enterprise

    Sponsored by: RSA, The Security Division of EMC

    This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.