Standards mobile deviceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Standards mobile device returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Laptops/ Notebooks/ Tablet PCs
 •   Network Security
 •   Mobile Field Sales/ Wireless Connectivity
 •   Data Security
 •   Endpoint Security
 •   Virtualization
 •   Security Policies

Related Searches
 •   Article About Standards mobile
 •   Automate Standards
 •   Repairs Standards mobile
 •   Resource Standards mobile
 •   Standards mobile Guidelines
 •   Standards mobile Measure
 •   Standards mobile Proposals
 •   Standards mobile device Consultant
 •   Standards mobile device Terminal
 •   Utility Standards
Advertisement

ALL RESULTS
1 - 25 of 418 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Unified Communication for Dummies by Avaya Inc.

November 2008 - (Free Research)
Find here the real-world examples of how unified communications is being used now to solve critical business challenges and the tips you can use to meet your business needs in the modern, mobile work environment. 
(BOOK) READ ABSTRACT |

How to Handle Mobile Devices' Impact on the Network by SearchNetworking.com

April 2014 - (Free Research)
The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months. 
(EBOOK) READ ABSTRACT |

Essential Wi-Fi Services for Smartphones and Tablets by Aruba Networks

March 2014 - (Free Research)
In this white paper, discover the essential Wi-Fi services you need for smartphones and tablets, including wireless screen mirroring, wireless printing, app sign-on and more. Also, learn about a modern Wi-Fi technology that enables all these services and more, so you can support a large number of mobile devices in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

The Forrester Wave™: File Sync And Share Platforms by EMC Corporation

July 2013 - (Free Research)
This report and accompanying spreadsheet detail the findings about how well each file sync and share vendor scores based on Forrester's criteria and where they stand in relation to each other. Read on to discover more! 
(WHITE PAPER) READ ABSTRACT |

How CIOs drive innovation and create value across the enterprise by ComputerWeekly.com

April 2014 - (Free Research)
Today's CIO is uniquely positioned to lead innovation and drive transformation across the modern enterprise, says Hunter Miller, in this extract from his book, Leading The Epic Revolution. 
(BOOK) READ ABSTRACT |

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment by IBM

October 2013 - (Free Research)
This guide discusses security leaders' top concerns with today's aggressive threat landscape. 
(WHITE PAPER) READ ABSTRACT |

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment by IBM

October 2013 - (Free Research)
This guide discusses security leaders' top concerns with today's aggressive threat landscape. 
(WHITE PAPER) READ ABSTRACT |

True Stories of the Connected: Same Day Delivery by Cisco Systems, Inc.

April 2014 - (Free Research)
This brief but informative webcast examines how bike messengers on the streets of San Francisco are benefiting from the increased connectivity that mobile technology provides. 
(CASE STUDY)

PCI Council issues mobile application rules for software developers by Hewlett-Packard Company

April 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

Why Readiness Assessments are Vital for Mobile Security by Cisco Systems, Inc.

December 2012 - (Free Research)
This whitepaper will help you determine if your network is properly secured against the vulnerabilities caused by BYOD. Inside, you'll find a series of questions you need to consider when it comes to your network policies, security resources and current management solutions. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly Buyer's Guide to Mobile Device Management by TechTarget

March 2014 - (Free Research)
The trend for consumerisation and employees using their own devices for work comes as concerns over data security mount. In this 11-page buyer's guide, Computer Weekly examines how to formulate a strategic policy for mobile device management (MDM), and how to choose the right MDM approach and product portfolio for your organization. 
(RESOURCE)

Productivity, Mobility and Efficiency: Keeping Your Devices Secure by Cisco Systems, Inc.

November 2012 - (Free Research)
In this research report, uncover how organizations are – or should be – responding to the invasion of mobile devices in the workplace, the emerging trends in enterprise mobility today, best practices for ensuring effective mobile policies, and much more! 
(WHITE PAPER) READ ABSTRACT |

Help Secure and certify your mobile Ecosystem by AT&T Corp

June 2011 - (Free Research)
Mobility is transforming the way we conduct business, introducing significant security considerations that require upfront planning.  Uncover suggestions on how to promote a secure mobile ecosystem as this white paper discusses security standards and considerations.   
(WHITE PAPER)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

June Issue of Information Security magazine: Mobile Security: A New Game Plan by Information Security Magazine

June 2011 - (Free Research)
This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges. 
(EZINE)

Five Calls to Make When Developing a Mobile Learning Strategy by SkillSoft Corporation

June 2011 - (Free Research)
Welcome to the exciting (and confusing) world of mobile learning. What are the five calls to make when developing a mobile learning strategy? Find out in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

The CIO's Guide to Mobile Security by BlackBerry

October 2006 - (Free Research)
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 November 2012: Inside the £65m datacentre supporting Tesco's online strategy by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we visit the £65m datacentre that sits at the heart of Tesco's ambitious online strategy. Government has approved the iPhone for use by Whitehall officials – we assess the risks. And the CIO at British Gas talks about how IT transformed the firm's customer service. Read the issue now. 
(EZINE) READ ABSTRACT |

SQL Anywhere v11.0.1 Developer Edition by Sybase, an SAP company

June 2010 - (Free Research)
Addresses need for high reliability and data sync to multiple device platforms. Avoids need for a DBA, and reduces development effort by simplifying performance optimisation and back end connectivity. Works with standard development tools and languages. 
(DOWNLOAD) READ ABSTRACT |

Alfresco Mobile by Alfresco Software

May 2012 - (Free Research)
This webcast takes a look at tablets in the enterprise, their content management capabilities, and how your business can make the most out of this relatively new technology. 
(WEBCAST) READ ABSTRACT |

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid. 
(WHITE PAPER) READ ABSTRACT |

How to tackle secure protocols and mobile management by ComputerWeekly.com

November 2010 - (Free Research)
For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming. 
(WHITE PAPER) READ ABSTRACT |

Putting mobile first: best practices of mobile technology leaders by IBM

August 2013 - (Free Research)
This exclusive paper investigates the approaches that businesses are using to support the transformational shift to mobile. Discover best practices and characteristics of successful mobile infrastructures that you can apply to your own initiative. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 418 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts