ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Payments Research

  • Secure Retail Eases the BlackBerry to iOS Transition

    Sponsored by: IBM MaaS360

    In this white paper, you will discover a comprehensive security solution for iOS devices that has a clean and intuitive interface with easy reporting and usage tracking for expense management. Read on to meet your key functionality requirements for your mobile policies and safely incorporate iOS into your MDM.

  • RailCom Meets Client Needs While Ensuring Corporate Data and Device Security

    Sponsored by: IBM MaaS360

    In this case study, you will learn how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based EMM solution. Read on to discover how your business can deploy remote wipe, SIM card blocking, and more.

  • How to Mobilize your Corporate Content and Apps

    Sponsored by: IBM MaaS360

    In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.

  • The Future of Insurance

    Sponsored by: ComputerWeekly.com

    CIOs and IT departments in the insurance industry must strive to create an environment that will support the business focusing on future innovations, according to this report from Trustmarque.

  • Mobile Consumer 2015

    Sponsored by: ComputerWeekly.com

    Britain's mobile phone owners look at their devices nearly 1.1 billion times a day, the equivalent of 400 billion times a year, according to research from Deloitte.

  • Stay Connected With Customers, Wherever They Roam

    Sponsored by: SearchCRM

    In this handbook, consultant Steve Robins explains how mobile location-based services work, the benefits of using them, and the potential risks. Then, executive editor Lauren Horwitz writes about how retailer Nordstrom has adopted beacon technology to better assist in-store customers.

  • HIPAA Compliance Checklist for Mobility

    Sponsored by: MobileIron

    Access this white paper to learn the best practices for creating a HIPAA compliance program capable of handling device loss, rogue apps, risky user actions and more.

  • Future Trends in UK Banking

    Sponsored by: ComputerWeekly.com

    The number of people using mobile and online banking will increase dramatically over the next five years, with major technology implications for banks, this report from the Centre for Economics and Business Research (Cebr) and Fiserv reveals.

  • Five Security Concerns with Mobile Payment Systems

    Sponsored by: Global Knowledge

    This white paper details the 5 security concerns you should keep in mind before linking your finances to a mobile payment solution.

  • How to Delivery Cutting Edge Productivity via Mobility

    Sponsored by: Dimension Data

    Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.

  • The Ultimate Guide to BYOD

    Sponsored by: MobileIron

    This exclusive white paper details a road map to becoming a "Mobile First" enterprise, rolling out sustainable BYOD strategies secure and efficiently. Read on to learn more.

  • Burning Dollars – Top Five Ways to Cut Corporate-Liable Mobile Costs

    Sponsored by: Dimension Data

    This exclusive white paper takes an in-depth look at 5 ways to cut corporate-liable mobile costs.  Read on to learn more.

  • Cloud First Mobile First – Introducing Enterprise Mobility as a Service

    Sponsored by: Dimension Data

    This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.

  • Enterprise Mobility-as-a-Service

    Sponsored by: Dimension Data

    This exclusive white paper dives into Enterprise Mobility-as-a-Service (EMaaS) and explains the benefits that come along with this new option. Read on to learn more.

  • Staying Secure in the Cloud: Considerations for Migrating Communications Solutions to Cloud Services

    Sponsored by: ShoreTel

    This white paper examines security considerations for migrating communication solutions into the cloud and offers insight into how a cloud service protects your valuable data. Plus, find 9 must-ask questions for your UCaaS provider.

  • 2015 Gartner Magic Quadrant for Client Management Tools

    Sponsored by: IBM

    In this exclusive Gartner Magic Quadrant resource , join analysts Kevin Knox and Terrence Cosgrove as they take an in-depth look at the client management tools market. Read on to access a vendor comparison of mobile management and security features, as well as strengths and weaknesses for leading vendors.

  • What You Should Know About File Sync-And-Share Workloads

    Sponsored by: Commvault

    This exclusive white paper takes an in-depth look at how endpoint security and data backup should be handled with the rise of enterprise mobility and BYOD. Read on to learn more.

  • Magic Quadrant for Enterprise Mobility Management Suites

    Sponsored by: Maas360 by IBM

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. This magic quadrant for enterprise mobility management suites can help you decide. Read on to learn more.

  • Enterprise Mobility: The Year in Review

    Sponsored by: IBM

    In this exclusive webcast, IBM teamed up with research analyst firm Ovum for a series of presentations aimed at identifying the must-know trends in mobility in 2015. View now to learn more.

  • Apps to the Future: Predicting Enterprise Mobility in 2015

    Sponsored by: Maas360 by IBM

    This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.

  • An Exclusive Guide for Promoting Enterprise Mobility Management

    Sponsored by: SearchMobileComputing

    This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.

  • Endpoint Data Protection: A Buyer's Checklist

    Sponsored by: Commvault

    This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.

  • CIO Spotlight: Controlling Data Risk In the BYOD Onslaught

    Sponsored by: Commvault

    This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.

  • Buyer's Guide to 802.11ac Wireless: The Time to Move is Now!

    Sponsored by: Extreme Networks

    Keeping the network up to speed is no easy task - but with wireless from 802.11ac, speed can be increased by up to three times as much as before. Read on to learn more.

  • EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce

    Sponsored by: FrontRange Solutions Inc.

    This exclusive white paper takes an in-depth look at enabling unified endpoint and service management for mobile workers. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.