ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device ManagementResearch

  • Unified Workspaces: a better way to securely deliver applications and files to mobile and BYOD devices

    Sponsored by: NComputing

    Employees are changing the way they do business because of the increasing mobility of the workforce, causing them to utilize tablets. This white paper outlines how unified workspaces are all about simplicity, affordability and productivity. See how a leading vendor utilizes unified workspaces to enhance productivity for end users and IT.

  • oneSpace; A unified Workspace Solution for Hybrid Environments

    Sponsored by: NComputing

    Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.

  • The Mobile First Approach to Business Intelligence

    Sponsored by: Information Builders

    Access the following informative white paper to examine the current state of mobile BI applications and gives insight into the technology and strategies needed to ensure your mobile BI projects run as smoothly and effectively as possible.

  • Secure Mobile Printing with UniPrint

    Sponsored by: Citrix Ready and UniPrint

    In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.

  • Enterprise Mobility Management Envelops Data as Well as Devices

    Sponsored by: SearchConsumerization.com

    IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices.

  • CW Europe – October 2014 Edition

    Sponsored by: ComputerWeekly.com

    BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.

  • IBM SmartCloud for Social Business Mobility

    Sponsored by: IBM

    This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.

  • Meeting Workforce Demands: Why—and How—IT Should Modernize End-User Computing

    Sponsored by: VMware, Inc.

    This whitepaper will walk you through the four biggest trends affecting IT departments and how they manage end-user computing, and also offers the four best practices that will help you meet these challenges head on.

  • How Mobile Management Services Fill a Critical Security Need

    Sponsored by: Global Knowledge

    For organizations considering Mobile Management Services (MMS), such an increase demonstrates why it's critical to address MMS adoption and deployment now, before unchecked proliferation can cause serious problems.

  • Mobile Business Intelligence 101: Proven Strategies and Use Cases

    Sponsored by: Information Builders

    Access the following white paper to examine the growth of dependence for mobile BI and how it can offer either large competitive advantages or some serious headaches. Additionally, learn about the technology to consider and more.

  • Evolving Toward the Next Phase of Email

    Sponsored by: IBM

    This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.

  • Computer Weekly buyer's guide to endpoint security

    Sponsored by: ComputerWeekly.com

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

  • Security in the New Mobile Ecosystem – A Ponemon Institute Study

    Sponsored by: Raytheon Trusted Computer Solutions

    This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.

  • How to survive security risks within a BYOD environment

    Sponsored by: Dell, Inc. and Windows 8 Pro

    Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.

  • Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment

    Sponsored by: IBM

    This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.

  • Enabling Secure Enterprise Mobility

    Sponsored by: Aruba Networks

    This exclusive whitepaper explores four things you must focus on to ensure secure enterprise mobility for your organization.

  • Leveraging VMware to Support Changing Workstyles

    Sponsored by: VMware, Inc.

    This whitepaper walks through the major trends affecting computing methods in the workplace and explains how Desktops-as-a-Service can help you securely deliver desktops and apps to end users through a unified workspace with little to no upfront capital costs.

  • Accelerating Mobile Development with PaaS, SaaS and IaaS

    Sponsored by: IBM

    In this e-guide, experts highlight how Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Infrastructure-as-a-Service (IaaS) can jumpstart your mobile app development processes and get your software out the door faster.

  • Social Engineering in IT Security

    Sponsored by: ComputerWeekly.com

    This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.

  • Computer Weekly – 30 September 2014: Hacking IT from the inside

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.

  • Leverage the Power of APIs to Turbocharge Your Mobile Strategy

    Sponsored by: Intel® Services

    This guide examines how today's top organizations are handling API management, including a breakdown of the "seven steps" required to build a successful API program.

  • Selecting Which Mobile Devices to Test

    Sponsored by: Orasi

    Mobile application testing presents a variety of unique challenges – the most formidable of which is supporting every device running any operating system. This whitepaper considers strategic opportunities to help development teams choose which mobile devices to test to achieve maximum efficiency.

  • Avoiding BYO Policy and Security Pitfalls

    Sponsored by: Citrix

    When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.

  • Best Approaches to BYOD and Mobile Security

    Sponsored by: Citrix

    This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.

  • Mobility’s Potential for Productivity and Pitfalls

    Sponsored by: CA Technologies.

    In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.