Research Library

Powered by

Mobile Device Management Research

  • The Rise of Cloud-Based Application Security Vulnerabilities

    Sponsored by: Onapsis

    This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.

  • IT Guide for Mobility: Making the Case to Business Leaders

    Sponsored by: Cisco Systems, Inc.

    Access this guide to gain strategies on communicating the full value of mobility to key business stakeholders in the organization, from HR to Marketing and beyond.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.

  • Mobile Malware Hits Active Sync-Only Devices

    Sponsored by: MobileIron

    Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.

  • IT Guide for Mobility: Making the Case to HR Leaders

    Sponsored by: Cisco Systems, Inc.

    This primer offers some strategies to help IT communicate the full value of mobility to key HR stakeholders in the organization. It explains why partnering with IT is their smartest path to success.

  • Nova Southeastern University College of Dental Medicine Uses Virtualization Tools to Boost Simulation Labs

    Sponsored by: Dell, Microsoft and Citrix

    Find out how turning to desktop virtualization allowed Nova Southeast College of Dental Medicine in Ft Lauderdale, FL to provide students with the simulation lab technology needed to better prepare and train for their dental careers.

  • Nova Southeastern University College of Dental Medicine Improves Simulation Lab with Desktop Virtualization

    Sponsored by: Dell, Microsoft and Citrix

    Nova Southeast College of Dental Medicine in Ft Lauderdale, FL, found their current simulation lab technology could not deliver the training students needed to prepare their dental careers. Find out how turning to desktop virtualization tools allowed them to provide students with better planning.

  • Mobility for Today, Supporting Strategies for Tomorrow

    Sponsored by: CraveInfoTech

    Mobility is the next major workforce improvement, but many companies have not yet made the proper investments due to various concerns, like security and ROI. Access this white paper to overcome these concerns, learn what mobility has to offer various vertical industries, and how it benefits HR teams across the board.

  • Worldwide EMM Market Shares: Vendors and Market Share Changes the Landscape

    Sponsored by: VMware, Inc.

    This study analyzes the EMM market, ranking the top 14 vendors by revenue and revealing the market trends and events that have helped shape the market landscape. Uncover advice on what you can do in the EMM buying phase.

  • Rapid Mobile Innovation Begins at the Business Level

    Sponsored by: Red Hat

    Demand for mobile apps is increasingly being driven by lines of business— not just IT. This e-book examines 7 myths around mobile app development and describes techniques and rapid mobile application development (RMAD) tools that get apps to market faster. Access now to learn how your business can benefit more from mobile apps.

  • Mobile App Infrastructure and the New "Mindset" of Node.js

    Sponsored by: Red Hat

    This e-guide details how Electronic Arts Inc. learned from their failed efforts and constructed a successful strategy for deploying cloud infrastructure for mobile apps. Additionally, learn from Red Hat CTO, Mícheál Ó Foghlú on how Node.js went exponential and how it's contributing to a new "mindset" when it comes to enterprise mobility.

  • Mobile App Development: Today's Platforms and Trends

    Sponsored by: Red Hat

    This e-guide provides 6 key considerations to keep in mind when searching for a mobile application development platform. Additionally, learn how cross-platform mobile development tools simplify the mobile application development process and discover the symbolic relationship between mobile devices and cloud computing through an in-depth Q&A.

  • Creating Business Value with Internet-Connected and Mobile-First Strategies

    Sponsored by: Red Hat

    This expert e-guide details 5 IIoT companies that prove the value of internet-connected manufacturing. Learn how IIoT offers these companies benefits like process optimization and costs saving. Additionally, educate yourself on how to choose the right middleware for your mobile-first strategy.

  • IDC: Rethinking the Network as a Security Sensor and Enforcer

    Sponsored by: Cisco Systems, Inc.

    Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.

  • 12 Vital Considerations to Keep In Mind When Choosing a Mobile Application Platform

    Sponsored by: Red Hat

    Mobility is creating demand for faster, continuous development cycles that challenge traditional IT infrastructure. Many companies are turning to mobile application platforms to meet these challenges. Access this white paper that details 12 vital considerations to keep in mind when choosing a mobile application platform for your enterprise.

  • Mobile Maturity Survey

    Sponsored by: Red Hat

    The mobility market still has some growing up to do to take advantage of opportunities to increase efficiencies and revenue streams. This e-book, providing the results of a Vanson Bourne survey, uncovers how mobile maturity is trending and what strategies and technologies are being put in place to achieve mobile maturity and success.

  • Six Steps to a More Secure Business: Mitigating the Threats to Your Data

    Sponsored by: NTT ICT

    Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.

  • Simplifying Security Engineering With Effective Network Segmentation

    Sponsored by: Cisco Systems, Inc.

    Forrester Consulting conducted a Total Economic Impact (TEI) study and examined the potential return on investment enterprises may realize by deploying Cisco TrustSec. Access this report to explore and evaluate the potential financial impact of Cisco TrustSec on your organization.

  • Putting Digital at the Heart of Your Business

    Sponsored by: Red Hat

    Digital technologies are a catalyst for new ways of doing business and are leading a wave of innovation and change for organizations. This e-book looks at the impact of mobile and digital on business processes, technology and culture, highlighting 7 steps to a successful digital business.

  • Improving Revenue and Population Health: New Strategies for Health IT

    Sponsored by: Medfusion

    Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.

  • Mobile App Development Challenges & New Tactics

    Sponsored by: TechTarget

    Our guide, Stay Aloft With Mobile Applications in the Cloud, reveals trends in mobile app adoption and new challenges facing the developers making them. Find expert advice on navigating today's mobile app challenges, how to choose middleware for your mobile-first strategy, and using mobile apps to exploit IoT cloud services.

  • The Best Ways to Manage Shadow IT

    Sponsored by: Juniper Networks, Inc.

    Shadow IT raises challenges, namely security, integration, and operational ones. This essential guide looks at the trends that are driving the rise of shadow IT, explores the drawbacks and benefits it offers and explains how to design the right network for your preferred shadow IT strategy.

  • Secure Content Collaboration Across All Devices

    Sponsored by: Citrix

    This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.

  • Are You Complacent About Mobile Threats?

    Sponsored by: Lookout

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

  • Transforming User IT Support: Bringing Users and Resolution Closer Together

    Sponsored by: IBM

    This white paper provides an in-depth look at the right-to-left strategy components designed to help IT leaders evaluate their support environments. Discover ways to demonstrate quantitative improvement in productivity and cost savings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.