ComputerWeekly.com Research Library

Powered by Bitpipe.com

Smart PhonesResearch

  • Enterprise Mobility Management Suite from CA Technologies

    Sponsored by: CA Technologies.

    This exclusive white paper examines an in-depth look at an enterprise mobility solution that can help your organization meet the constant demands of end-users on the network.

  • Overview of CA Management Cloud for Mobility

    Sponsored by: CA Technologies.

    This exclusive white paper examines an in-depth look at an enterprise mobility solution that can help your organization meet the constant demands of end-users on the network. Read on to learn more.

  • Comprehensive Enterprise Mobile Management for iOS 8

    Sponsored by: Citrix

    This exclusive white paper offers a comprehensive enterprise mobile management guide for iOS 8 devices. You'll also discover the key differences between iOS 7 and 8 in regards to mobile management. Read on to learn more.

  • Dell Enterprise Mobility Management

    Sponsored by: Dell Software

    Maximize employee productivity, secure your data, reduce complexity and lower your level of corporate investment with a complete mobility/BYOD solution that meets all your needs. Read the brochure to learn more about Dell™ Enterprise Mobility Management.

  • Dell Business Phone Enables BYOD

    Sponsored by: Dell Software

    Increase productivity on personal mobile devices while enabling your enterprise to retain control and security. Give employees a separate business phone line on their personal devices, plus the robust business phone capabilities they need for work. Read the datasheet for details.

  • Enterprise Data Access on Mobile Devices

    Sponsored by: Dell Software

    Discover how to build on the capabilities of Exchange ActiveSync, and boost employee productivity, enhance manageability and increase security. Read this white paper to learn about an evolutionary solution that meets the demands of today's mobile computing world.

  • Staying Compliant with BYOD Programs

    Sponsored by: Dell Software

    Find out how to implement a BYOD program, and protect your data, networks and employees – all while controlling administrative complexity and meeting government compliance requirements. Read the white paper.

  • Developing New User BYOD Agreements

    Sponsored by: Dell Software

    Implementing a BYOD program? You may to need to modify existing policies, or create new user agreements that help obtain employee acceptance of those new policies. Learn about several best practices that can help you construct an effective, practical user agreement.

  • Why BYOD?

    Sponsored by: Dell Software

    Discover how to maximize the benefits of a BYOD program without sacrificing IT control. Find out how to take into account the full range of user, IT and business requirements when choosing a BYO solution. Get the full details in this insightful white paper.

  • Augmented IVR – Second Life for Interactive Voice Response

    Sponsored by: [24]7 Customer Inc.

    Find out how interactive voice response (IVR) and voice app infrastructures have brought both visual and voice resources into each customer's journey.

  • OFS and BaaS – Why You Need both

    Sponsored by: Code42

    Watch this webcast to hear ESG Senior Analysts Jason Buffington and Teri McClure discuss the importance of protecting endpoint devices, how OFS and BaaS are similar and why they're both necessary.

  • Device Fingerprinting – Low-Friction, BYOD Authentication

    Sponsored by: SecureAuth

    This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.

  • Take Authentication Beyond Passwords with Secure Remote Access

    Sponsored by: HID

    This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.

  • Secure Identity and Smart Employee ID Solutions

    Sponsored by: HID

    This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.

  • Performance optimized 802.11ac/n Dual-Radio 3x3:3access point with internal antenna option

    Sponsored by: Aerohive Networks

    This white paper details a network solution that was able to deliver rock solid connection even in the most high-density environments. Read on to learn more.

  • How to Onboard Thousands of Devices only the Day after Software Implementation

    Sponsored by: IBM

    This white paper details a mobile device management solution that was able to begin on-boarding devices by up to 200 a minute at peak, with 15,000 users on the first day. Read on to learn more.

  • Mobile Security Best Practices in a Healthcare Setting

    Sponsored by: Insight

    This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.

  • BYOD, Data Leakage, and Regulatory Compliance

    Sponsored by: BitGlass

    This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.

  • IT and Enterprise Mobility: IT Is Fully Charged and Ready to Roam

    Sponsored by: CA Technologies.

    Do you know how your mobility strategy stacks up against other organizations? This report reveals findings from a Vanson Bourne survey on IT and enterprise mobility.

  • What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?

    Sponsored by: IBM

    Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Unlock possibilities with IBM MessageSight

    Sponsored by: IBM

    Check out this brief video to learn about a way to connect sensors and mobile devices safely, securely, and conveniently to the cloud. You'll learn about a new full-featured messaging appliance that connects customer apps and front office systems with back office systems, delivering the performance and simplicity needed for the mobile world.

  • Addressing HIPAA privacy compliance on hospital wireless networks

    Sponsored by: Absolute Software

    In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.

  • oneSpace; A unified Workspace Solution for Hybrid Environments

    Sponsored by: NComputing

    Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.

  • Creating a unified workspace for your tablet

    Sponsored by: NComputing

    Tablets are a great tool to allow employees access to business files and applications, without being tied to a physical desktop. Find out how a leading vendor can transform a tablet so users can have seamless tablet access to everything they need including business applications and files, without breaking budget or resources.

Browse by Report Type: Smart Phones White Papers | Smart Phones Multimedia | Smart Phones IT Downloads

See more topics related to: Smart Phones

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.