ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device Management Research

  • The sped-up deployment of IoT on the back of "failure free" 5G

    Sponsored by: ComputerWeekly.com

    Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid.  In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

  • EMPOWERING WORKER MOBILITY WITH IGEL

    Sponsored by: IGEL Technology GmbH

    With an increasingly remote workforce comes new challenges. Learn how to solve key endpoint deployment, management, and other remote work challenges with a powerful, centralized endpoint management platform.

  • CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance

    Sponsored by: ComputerWeekly.com

    One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.

  • Your 5G Questions

    Sponsored by: Vodafone

    5G could be considered just a shift forward from previous generations of mobile connectivity. However, its potential is greater than any previous generations.5G aims to bring 3 major benefits to mobile computing. Take the brief survey to download this interactive guide of how 5G works for business and what it can offer.

  • Vodafone Secure Sector | Introducing our Business Security Enhanced portfolio

    Sponsored by: Vodafone

    In today’s digitally evolving workforce, it can be very difficult to maintain specialized cyber skills or get access to the latest insights and tools. In this video, you will learn how to gain the expertise and access to monitor your network performance, control incidents and more. Take the survey to access this resource.

  • Our Cyber Security Myth-Buster Guide

    Sponsored by: Vodafone

    Cybersecurity is a crucial consideration for any modern business – regardless of your size and industry. To help your business get secured against cyber threats today and for the future, this e-book outlines the top 10 commonly believed cyber security myths. Take the survey to unlock the complete cybersecurity myth-buster guide.

  • Levelling up - How 5G can boost productivity across the UK

    Sponsored by: Vodafone

    This WPI Economics report, commissioned by Vodafone UK, contributes to the growing literature that highlights the vast potential of the rollout of 5G for individuals, families and society as a whole. Complete a brief survey to download the report and discover the potential productivity gains displayed by 5G across every region and nation of the UK.

  • Your 5G Advantage

    Sponsored by: Vodafone

    For years, there’s been the promise that 5G will change the way we live and work, but it won’t happen as soon as we think. This paper covers the real aspects of 5G’s evolution, answering your most frequently asked questions. Access this resource now after completing a brief survey.

  • VBSE Mobile Enhanced - Critical mobile security for Critical National Infrastructure

    Sponsored by: Vodafone

    Digital and mobile have become more entwined with our personal and work lives, which calls for a partner who can provide the critical mobile security to keep CNIs moving. Take a short survey to watch this video detailing Vodafone’s Mobile Enhanced and its 4 products that aim to provide insights, intelligence and the highest level of security.

  • Ct Text for Microsoft Teams

    Sponsored by: CallTower, Inc.

    There’s never been a better time to unify messaging as a part of your communications strategy. In the event that you or your employees don’t have access to video, you can now send and receive SMS messages with contacts in Outlook, Active Directory, SharePoint and Teams. View this data sheet to get more information.

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • Computer Weekly – 23 June 2020: How the Chelsea Flower Show blossomed as an online-only event

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the digital team at the Royal Horticultural Society about delivering the first online-only Chelsea Flower Show. With all the talk about the consumer uses of 5G, we look at how it could benefit enterprise IT. And we examine the best practice in managing SAP systems during lockdown, Read the issue now.

  • Omdia Market Radar: Zero-Trust Access

    Sponsored by: Cloudflare

    Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.

  • MSPs transform their endpoint security

    Sponsored by: Malwarebytes

    In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation

    Sponsored by: WhiteHat Security

    A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.

  • CW Nordics - November 2020-January 2021: Bank branch closures continue as digital banking grows

    Sponsored by: ComputerWeekly.com

    Sweden's Handelsbanken is cutting its branch network by nearly half, which means more money will be invested in IT. But it's not just Sweden and the Nordics – banks across the world are watching the fintech industry demonstrate to consumers what banking can be like if the right technology is in place.

  • Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility

    Sponsored by: Barracuda

    With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.

  • Brave the new normal: How companies in Asia-Pacific are overcoming security challenges in a remote workplace.

    Sponsored by: Barracuda

    According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.

  • Solving the Challenges of Modern Remote Access

    Sponsored by: Barracuda

    The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.

  • 13 email threat types to know about right now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.