ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Payments Research

  • The future of enterprise IT: Social, mobile, analytics and cloud

    Sponsored by: ComputerWeekly.com

    Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.

  • An Expert Guide on BYOD: Spend Less on Devices and More on Support

    Sponsored by: vmware airwatch

    In this exclusive e-guide, you will discover how to implement BYOD policies that outline acceptable use of personal devices in the workplace. Access this expert guide to solve your BYOD conundrums and address issues such as data security, application usage, and compliance, and safeguard data accessed through mobile.

  • The Future of Insurance

    Sponsored by: ComputerWeekly.com

    CIOs and IT departments in the insurance industry must strive to create an environment that will support the business focusing on future innovations, according to this report from Trustmarque.

  • E-Guide: Where MDM Fits Into Your Enterprise Mobile Strategy

    Sponsored by: vmware airwatch

    In this exclusive e-guide, you will track how EMM has matured since its beginnings, as well as discover how MDM and MAM figure together in the modern enterprise environment. Read on to discover the renewed flexibility of MDM in the wake of Windows 10 and desktop app integration.

  • Exclusive E-Guide: Ten Windows 10 Features IT Pros Will Love

    Sponsored by: vmware airwatch

    In this exclusive e-guide, you will discover 10 enterprise-friendly enhancements that W10 has to offer your organization. Access this guide now to key into 10 W10 must-have features for IT, including device guard to ease MDM and universal business apps from the Windows app store.

  • BYOD Done Right Is a Win-Win for Workforce Mobility

    Sponsored by: vmware airwatch

    By accessing this paper by Frost & Sullivan, you'll discover how VMware AirWatch delivers a compromise-free approach to workforce mobility. Learn what this particular BYOD strategy entails, and what facets of customization are a key part of it.

  • Mobile Consumer 2015

    Sponsored by: ComputerWeekly.com

    Britain's mobile phone owners look at their devices nearly 1.1 billion times a day, the equivalent of 400 billion times a year, according to research from Deloitte.

  • HIPAA Compliance Checklist for Mobile

    Sponsored by: MobileIron

    Access this white paper to learn the best practices for creating a HIPAA compliance program capable of handling device loss, rogue apps, risky user actions and more.

  • Future Trends in UK Banking

    Sponsored by: ComputerWeekly.com

    The number of people using mobile and online banking will increase dramatically over the next five years, with major technology implications for banks, this report from the Centre for Economics and Business Research (Cebr) and Fiserv reveals.

  • Five Security Concerns with Mobile Payment Systems

    Sponsored by: Global Knowledge

    This white paper details the 5 security concerns you should keep in mind before linking your finances to a mobile payment solution.

  • 2015 Gartner Magic Quadrant for Client Management Tools

    Sponsored by: IBM

    In this exclusive Gartner Magic Quadrant resource , join analysts Kevin Knox and Terrence Cosgrove as they take an in-depth look at the client management tools market. Read on to access a vendor comparison of mobile management and security features, as well as strengths and weaknesses for leading vendors.

  • Protecting your Customers’ Online Banking Transactions

    Sponsored by: HID

    Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.

  • Stay Connected With Customers, Wherever They Roam

    Sponsored by: SearchCRM

    In this handbook, consultant Steve Robins explains how mobile location-based services work, the benefits of using them, and the potential risks. Then, executive editor Lauren Horwitz writes about how retailer Nordstrom has adopted beacon technology to better assist in-store customers.

  • What You Should Know About File Sync-And-Share Workloads

    Sponsored by: Commvault

    This exclusive white paper takes an in-depth look at how endpoint security and data backup should be handled with the rise of enterprise mobility and BYOD. Read on to learn more.

  • Magic Quadrant for Enterprise Mobility Management Suites

    Sponsored by: Maas360 by IBM

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. This magic quadrant for enterprise mobility management suites can help you decide. Read on to learn more.

  • Enterprise Mobility: The Year in Review

    Sponsored by: IBM

    In this exclusive webcast, IBM teamed up with research analyst firm Ovum for a series of presentations aimed at identifying the must-know trends in mobility in 2015. View now to learn more.

  • Apps to the Future: Predicting Enterprise Mobility in 2015

    Sponsored by: Maas360 by IBM

    This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.

  • An Exclusive Guide for Promoting Enterprise Mobility Management

    Sponsored by: SearchMobileComputing

    This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.

  • Endpoint Data Protection: A Buyer's Checklist

    Sponsored by: Commvault

    This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.

  • CIO Spotlight: Controlling Data Risk In the BYOD Onslaught

    Sponsored by: Commvault

    This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.

  • Buyer's Guide to 802.11ac Wireless: The Time to Move is Now!

    Sponsored by: Extreme Networks

    Keeping the network up to speed is no easy task - but with wireless from 802.11ac, speed can be increased by up to three times as much as before. Read on to learn more.

  • EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce

    Sponsored by: FrontRange Solutions Inc.

    This exclusive white paper takes an in-depth look at enabling unified endpoint and service management for mobile workers. Read on to learn more.

  • Balancing wireless LAN troubleshooting strategies for BYOD

    Sponsored by: Extreme Networks

    This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.

  • Best Approaches to BYOD and Mobile Security

    Sponsored by: Citrix

    This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.

  • Wi-Fi Buyers Guide

    Sponsored by: Extreme Networks

    The huge growth of mobile and BYOD is driving user's demands to rise, while networks become more dense and harder to manage.  How can a balance be found between the two?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.