Mobile Device ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementNetworking and Communications SolutionsMobile Device Management  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 500 | Next Page

2014 Gartner Magic Quadrant for Enterprise Mobility Management by Citrix

August 26, 2013 - (Free Research)
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 18, 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

Enterprise mobility management: Embracing BYOD through secure app and data delivery by Citrix

February 28, 2013 - (Free Research)
Access this resource to learn more about enterprise mobility management (EMM), a mobile approach that allows IT to manage not only mobile devices themselves, but the applications and data present on them. Read on and learn about EMMs increasingly central role in the new era of IT. 
(WHITE PAPER) READ ABSTRACT |

The 10 “must-haves” for secure enterprise mobility by Citrix

February 28, 2013 - (Free Research)
This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: Emerging Threats, Essential Strategies by Juniper Networks, Inc.

February 15, 2012 - (Free Research)
In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows mobile on any device by Citrix

June 14, 2013 - (Free Research)
This exclusive white paper examines how you can virtualize Windows business applications and desktops in the data center and deliver high-performing, secure access to them from any type of mobile device, over any network connection. Read on to learn how you can take Windows mobile. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 30, 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

ABI Research: Mobilize Enterprise Office Communications NOW with 4G by Sprint

April 13, 2011 - (Free Research)
Ready to integrate 4G into your wireless communications strategy? 4G technologies operate on licensed spectrum allowing greater control over spectrum use and access. 4G also provides capacity and speed similar to Wi-Fi to enable demanding applications. 
(WHITE PAPER) READ ABSTRACT |

TUFF SHED Builds Productivity with Tracking Solution by AT&T Corp

October 04, 2011 - (Free Research)
In this case study discover how TUFF SHED, a leading provider of installed storage buildings and garages, implemented TeleNav Vehicle Tracker™ from AT&T to help the company improve the productivity of its workforce and better monitor its fleet. 
(CASE STUDY) READ ABSTRACT |

Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security by SearchSecurity.com

November 01, 2011 - (Free Research)
In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats. 
(EZINE) READ ABSTRACT |

IT in Europe: Taking control of smartphones: Are MDMs up to the task? by SearchSecurity.com

February 23, 2012 - (Free Research)
In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more. 
(EZINE) READ ABSTRACT |

IT in Europe: Adopting an Application-Centric Architecture by SearchSecurity.com

November 03, 2011 - (Free Research)
Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view. 
(EZINE) READ ABSTRACT |

Handbook: Increasing Wireless LAN Capacity: Understanding your options by SearchNetworking.com

September 11, 2013 - (Free Research)
In this tech guide, learn how to increase capacity in your enterprise wireless LAN with 802.11ac, and explore the uses of 60 GHz wireless technology in the upcoming 802.11ad standard. 
(EZINE) READ ABSTRACT |

Protect Your Business with Automated Business Continuity Solutions by SearchCIO.com

November 30, 2012 - (Free Research)
This white paper introduces automated business continuity solutions as a way to protect against the damage caused by IT downtime. 
(WHITE PAPER) READ ABSTRACT |

PCI Council issues mobile application rules for software developers by SearchSecurity.com

April 25, 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES by SearchSecurity.com

September 18, 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life. 
(EGUIDE) READ ABSTRACT |

Best Practices for Managing and Understanding Mobile Authentication by SearchSecurity.com

July 12, 2013 - (Free Research)
In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies. 
(EBOOK) READ ABSTRACT |

Weighing the Risks, Challenges and Benefits Before Diving into BYOD by SearchSecurity.com

March 22, 2013 - (Free Research)
This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Weighing the Options for an Enterprise Mobility Strategy by SearchSecurity.com

March 06, 2013 - (Free Research)
In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management. 
(EGUIDE) READ ABSTRACT |

Updating Your Corporate BYOD Program for Success by SearchSecurity.com

December 07, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program. 
(EGUIDE) READ ABSTRACT |

Understanding Consumer Device Management and BYOD by SearchSecurity.com

November 28, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Top Mobile Data Protection Best Practices by SearchSecurity.com

November 09, 2011 - (Free Research)
Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours. 
(EGUIDE) READ ABSTRACT |

Top 8 Considerations to Enable - and Simplify - Mobility by SearchSecurity.com

July 22, 2013 - (Free Research)
Embracing mobility doesn't need to be complicated or costly. Gain expert advice on the top 8 considerations for simply, but effectively enabling mobility in both the enterprise and the IT department. 
(WHITE PAPER) READ ABSTRACT |

Top 5 Enterprise Mobile Security Issues by SearchSecurity.com

January 04, 2013 - (Free Research)
While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more! 
(EGUIDE) READ ABSTRACT |

Top 10 BYOD Pitfalls to Avoid by SearchSecurity.com

July 08, 2013 - (Free Research)
This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 500 | Next Page

> Explore alternative searches for: Mobile Device Management

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts