Research Library

Powered by

Mobile Device Management White Papers

  • Real-World Experiences with Endpoint Security and Management

    Sponsored by: VMware

    Read through the experiences of an IT executive and a solutions architects as they detail the ins and outs of their enterprises' endpoint management strategies – and the tools that have been the most successful in the process.

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    Sponsored by:

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

  • Mobile Technology Developments To Watch 2019

    Sponsored by: Magenic

    Inside this report, find out what mobility developments you should keep a lookout for in 2019. You'll find a breakdown of expected market leaders, new gaps in the mobility industry, and impending technology advancements like cross-platform development tools, mobile QA tools, and more.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by:

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • The Evolution of Mobile Security

    Sponsored by: Symantec

    Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.

  • A History of Content Management Systems and the Rise of the Headless CMS

    Sponsored by: Contentstack

    There will always be disruptive technologies that will change the CMS playing field. There is no doubt that AI and machine learning are going to play a huge role in the future of content management. To understand the future of content management, this blog looks at how CMS first came on the scene and why there are different types.

  • 2019 and The Evolution Of Enterprise Mobility

    Sponsored by: Tangoe

    Reflect back on the trends, outcomes, and failures of mobility strategies in 2018 – and hopefully learn from those mistakes. Plus, get a glimpse at 2019 forecasts for enterprise mobility as technologies like 5G, artificial intelligence, and IoT continue to mature.

  • How Violin Systems Drives Compelling Value for Enterprises

    Sponsored by: Violin Systems

    IDC profiles the evolving all-flash market in this analyst report, with particular attention given to AFA vendor Violin Systems and their role in servicing the needs of performance-sensitive workloads as the industry transitions from SCSI to NVMe technology. To stay on top of the latest developments, view the report here.

  • Magic Quadrant for Managed Mobility Services, Global

    Sponsored by: Tangoe

    Managed mobility services (MMSs) are key in a mobile workforce for provisioning, managing, and supporting mobile devices, network services, and mobile applications. Check out this analyst report to learn how big players in the market stack up against one another.

  • CW Middle East ezine April 11 2019

    Sponsored by:

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • Simplify your mobile device management with AirWatch Express

    Sponsored by: Sprint

    Browse through this resource to learn how you can gain better control over your mobile device management process with AirWatch Express.

  • Simplified Mobile Device Management

    Sponsored by: Sprint

    Inside, find out how simplified mobile device management can help you easily provision and configure your devices in the time it would take you to make a cup of coffee.

  • 6 Ways Mobile Devices Can Modernize Manufacturing Task Management

    Sponsored by: Samsung Electronics

    Download this resource to learn six ways that mobile devices can modernize task management in manufacturing enterprises.

  • How Mobile Devices Simplify Manufacturing Compliance and Risk Management

    Sponsored by: Samsung Electronics

    The global footprint of many manufacturing companies makes compliance with mandatory regulations particularly challenging. In this article, explore some potential bottlenecks in production processes that present challenges for manufacturing compliance and how mobile devices can deliver efficiencies.

  • How Does Security Fit Into Your IoT Strategy?

    Sponsored by: Samsung Electronics

    IoT devices can pose as unsecured portals for three main reasons. In this article, find out what these reasons are and how your organization can implement and protect mobile devices in every ecosystem.

  • Lessons From 2018: Handling the Next Mobile Security Breach

    Sponsored by: Samsung Electronics

    The past year hosted a new volume and variety of threats to enterprise devices and the Android OS platform. How can enterprises adapt to protect their mobile devices in 2019? Read on to find out.

  • How Mobile Is Transforming Retail Staffing and the Shopping Experience

    Sponsored by: Samsung Electronics

    Download this resource to learn more about how mobile can transform retail staffing and the shopping experience, and take your organization to the next level.

  • Endpoint Zero Trust Protection in a Connected World

    Sponsored by: AppGuard

    In this resource, discover the security capabilities of AppGuard and how your organization could benefit from its zero-trust protection strategy.

  • Accelerating The Path To Mobility Innovation

    Sponsored by: Vox Mobile Solutions

    Download this white paper to learn how managed mobility services helped companies in industries from healthcare to finance, and everyone in between.

  • Endpoint Management & On-Going Mobile Support

    Sponsored by: Vox Mobile Solutions

    In this white paper learn how a combination of managed mobility services and unified endpoint management can help your IT team achieve this balance for a secure digital workspace.

  • Crafting a Secure Endpoint Management Strategy

    Sponsored by: Vox Mobile Solutions

    Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.

  • 4 Tips to Keep Off-Site Workers Productive

    Sponsored by: Dell and Intel®

    In this infographic uncover 4 tips on how to keep remote workers up and running as efficiently as possible – from connectivity to security and more.

  • 3 Tips to Keep Field Workers Productive

    Sponsored by: Dell and Intel®

    Check out this infographic to learn 3 ways you can provide field workers with the tools they need to be most productive in any environment.

  • Case Study: M-Files for Mobility

    Sponsored by: M-Files

    Businesses today have a constant paradox to circumvent - information needs to be widely available to employees, but also secure and compliant. Watch this case study interview to see how IGas Energy and Mazars UK worked around this modern dilemma.

  • The 5 Critical Requirements for the Digital Workspace

    Sponsored by: VMware

    Download this white paper to learn about the five major requirements for a successful digital workspace - from device management to employee empowerment and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.