ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device Management Research

  • Mobile Verify

    Sponsored by: Mitek Systems, Inc.

    Through advanced machine-learning algorithms, identity verification enables businesses to authenticate their digital users’, empowering them to enhance customer experience and data security. Read this data sheet to explore the science behind Mitek’s Mobile Verify digital identity verification tool and how it works.

  • Endpoint Protection

    Sponsored by: Malwarebytes

    Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.

  • Here are the Work Elements You’ll See in a Mobile App DevelopmentAgreement

    Sponsored by: CMOLDS

    Communication between the developer and the client often determines whether the vision of the product is actualized or not. Mobile app development agreements are one way to ensure this communication happens reliably. Read this white paper now to learn what exactly you should include in your mobile app agreement.

  • Lookout Phishing and Content Protection

    Sponsored by: Lookout Inc.

    While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.

  • Mobile Phishing Killchain

    Sponsored by: Lookout Inc.

    To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.

  • Mobile Phishing 2018: Myths and Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout Inc.

    Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. This white paper explores the common myths and facts around mobile phishing to help your organization identify and remediate threats.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.

  • The 2020 Vision: The Next Decade for Mobile Intelligence

    Sponsored by: MicroStrategy

    By 2022, its estimated that over half of organizations will be forced to re-examine the role of mobile devices within their workforce – and with good reason. Inside this research report, learn more about this impending “mobile imperative” and what it will mean for your organization in the not-so-distant future.

  • The changing mobile platform landscape

    Sponsored by: ComputerWeekly.com

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

  • Perspectives from HIMSS 2019

    Sponsored by: TechData - HPE

    There’s one critical rule of healthcare: put the patient first. Open this whitepaper to read about Dr. Rucker’s speech at the 2019 HIMSS, which highlights how healthcare must leverage IT mobile device interconnectivity to deliver premium care with instant personal health data accessibility for patients.

  • Device as a Service

    Sponsored by: NWN Corporation

    Download this white paper to learn how organizations are using device-as-a-service (DaaS) solutions to streamline endpoint management and device security responsibilities – and keep overhead and operational costs at a minimum.

  • UK Leads the Way for Security of Mobile Workforce; US Needs to Step it Up

    Sponsored by: PortSys

    US companies have dominated the media attention and have built considerable business helping to secure mobile devices.  But, the international competition is growing quite substantially. Learn about the state of mobile security in the UK vs. the US in this PortSys blog post from Michael Oldham.

  • When MDM is Not Enough: Context is Key

    Sponsored by: PortSys

    While Mobile Device Management (MDM) helps to manage a smartphone or tablet device to ensure that device is valid and approved, beyond this, many organizations still rely on usernames and passwords to determine access privilege. Read this article for reasons on why access control is so important when managing mobile devices today.

  • Unified Endpoint Management

    Sponsored by: TechTarget

    In this guide, learn how unified endpoint management (UEM) can supplement traditional mobility strategies to help ease the management and security burden facing your IT team.

  • Myth Busting Retail Associate Mobile Enablement

    Sponsored by: Infovista

    Smart use of mobile technologies can help retailers make store managers and associates more efficient, effective and productive in performing both customer-facing and operational tasks—so what’s holding you back? Download this resource for 10 myths that may prevent retailers from realizing benefits of mobile technology.

  • Workplace Strategy Guide for IT

    Sponsored by: Workplace by Facebook

    Highly-connected organizations are leaps more successful than those who aren't; and the data speaks for itself. Peek inside to learn about the quantified impact that a digital, highly-connected workplace can have on productivity, employee retention, and cyber-security.

  • How VMware Makes Digital Experience a Top Priority to Drive Growth

    Sponsored by: VMware

    Find out how VMware themselves fosters a seamless, highly-productive digital experience for their workforce – and what technology choices help them get there.

  • How to Lock Down Mobile Devices, Printers, and Laptops from Costly Cyberattacks

    Sponsored by: TechTarget

    Are we just supposed to shrug our shoulders and pretend we can't combat the proliferation of endpoints with smarter security tactics? Not a chance. Complete our endpoint security survey for access to our e-guide, which comes packed with powerful tips and tactics to lock down mobile devices, printers, and laptops from costly cyberattacks.

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

  • Mobile Technology Developments To Watch 2019

    Sponsored by: Magenic

    Inside this report, find out what mobility developments you should keep a lookout for. You'll find a breakdown of expected market leaders, new gaps in the mobility industry, and impending technology advancements like cross-platform development tools, mobile QA tools, and more.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • Advanced Secure Access for Remote and Mobile Workers

    Sponsored by: Barracuda Networks

    Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.

  • How Violin Systems Drives Compelling Value for Enterprises

    Sponsored by: Violin Systems

    IDC profiles the evolving all-flash market in this analyst report, with particular attention given to AFA vendor Violin Systems and their role in servicing the needs of performance-sensitive workloads as the industry transitions from SCSI to NVMe technology. To stay on top of the latest developments, view the report here.

  • CW Middle East ezine April 11 2019

    Sponsored by: ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • Crafting a Secure Endpoint Management Strategy

    Sponsored by: Vox Mobile Solutions

    Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.