Handheld Computers Reports

Mobile Configuration Management Functions for Successful MDM
sponsored by TechTarget Security
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

TechTarget Security

OneBridge Mobile Groupware, 5.5
sponsored by Sybase iAnywhere
TRIAL SOFTWARE: Ensuring your wireless email and other data is secure anytime, anywhere is a challenge. OneBridge 5.5 can help you deliver vital data over any connection, to any device or using Lotus Domino.
Posted: 23 Aug 2006 | Premiered: 23 Aug 2006

Sybase iAnywhere

ERP On the Go: Why Mobile Access is a Business Necessity
sponsored by Epicor Software Corporation
WHITE PAPER: This resource examines the significant advantages that your organization can gain with a strategy for mobile user access to ERP and other back office systems.
Posted: 06 Nov 2013 | Published: 31 Aug 2013

Epicor Software Corporation

BoxTone: Mobile User Management with ITIL and ITSM
sponsored by BoxTone
WHITE PAPER: This White Paper outlines the capabilities of Mobile User Management developed by BoxTone -- which for many of the best-known organizations are enabling improvements and efficiencies in responsiveness to mobile users, process, measurability, service...
Posted: 15 Apr 2008 | Published: 15 Apr 2008

BoxTone

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

BYOD: An Opportunity for IT Evolution
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

TechTarget Security

BlackBerry for Healthcare
sponsored by BlackBerry
PRODUCT LITERATURE: Read why BlackBerry is the leading wireless solution for keeping healthcare professionals connected to colleagues, patient details and medical information so they can provide higher quality patient care throughout the day.
Posted: 08 Nov 2007 | Published: 01 Jan 2004

BlackBerry

User-Based Licensing for Endpoint Protection and BYOD
sponsored by OpenText Security Solutions
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

OpenText Security Solutions

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.