mobile device management CompanyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: mobile device management Company returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Data Security
 •   Application Security
 •   Endpoint Security
 •   Security Policies
 •   Laptops/ Notebooks/ Tablet PCs
 •   Network Security
 •   Security Monitoring

Related Searches
 •   Companies mobile device
 •   Features mobile
 •   Guide mobile
 •   Management mobile device
 •   Manuals mobile device management
 •   Related mobile
 •   Sheet mobile
 •   Statement mobile device
 •   mobile device management Layer
 •   mobile device management Migration
Advertisement

ALL RESULTS
1 - 25 of 408 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Understanding the hard ROI of BYOD by ComputerWeekly.com

June 03, 2013 - (Free Research)
BYOD can increase IT costs, rather than decrease them. Companies need to look at carefuly at a range of variables to calculate the real ROI, says Nucleus Research 
(ANALYST REPORT) READ ABSTRACT |

Future Proofing Mobile Device Management by BlackBerry

December 23, 2011 - (Free Research)
This expert E-Guide discusses best practices for future proofing your mobile device management. 
(EGUIDE) READ ABSTRACT |

Mobile BI: Actionable Intelligence for the Agile Enterprise by SAS

June 28, 2011 - (Free Research)
This report describes how mobile devices can drive better BI. Find out how top performing companies have made mobile devices the primary platform for BI deployments. 
(WHITE PAPER) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 22, 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 4 December 2012: Games giant Sega takes to the cloud by ComputerWeekly.com

December 04, 2012 - (Free Research)
In this week's Computer Weekly, we talk to Sega about how the computer game giant has turned to the cloud to prepare for the Christmas rush. Our latest buyer's guide gives best practice advice on mobile device management. And Unilever tells us how business intelligence and analytics helps to better understand customer needs. Read the issue now. 
(EZINE) READ ABSTRACT |

Support Mobile Devices with SaaS WFM Software by Infor WFM Workbrain

January 24, 2012 - (Free Research)
This guide details how workforce management (WFM) software companies are incorporating support for mobile devices into their products and offering the application as software-as-a-service (SaaS). Read more to uncover the employee benefits associated with this strategy. 
(EGUIDE) READ ABSTRACT |

The Ten Must Haves for Secure Mobile Device Management by Zenprise

August 01, 2012 - (Free Research)
Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Checklist by Citrix

February 13, 2014 - (Free Research)
This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management. 
(EGUIDE) READ ABSTRACT |

User-Based Licensing for Endpoint Protection and BYOD by Webroot

June 11, 2013 - (Free Research)
User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization. 
(WHITE PAPER) READ ABSTRACT |

Defining and Enforcing a Clear Mobile Device Security Policy by BlackBerry

February 18, 2013 - (Free Research)
If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more. 
(EGUIDE) READ ABSTRACT |

Picking a Sensible Mobile Password Policy by Perimeter eSecurity

November 03, 2011 - (Free Research)
This paper recommends a passcode policy for mobile devices that is reasonable, user-friendly, highly usable, but still strong enough to protect your company’s data. 
(WHITE PAPER) READ ABSTRACT |

Why Readiness Assessments are Vital for Mobile Security by Cisco Systems, Inc.

December 31, 2012 - (Free Research)
This whitepaper will help you determine if your network is properly secured against the vulnerabilities caused by BYOD. Inside, you'll find a series of questions you need to consider when it comes to your network policies, security resources and current management solutions. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 18 March 2014: Boost productivity with collaboration technology by ComputerWeekly.com

March 18, 2014 - (Free Research)
In this week's Computer Weekly, we hear from IT leaders improving collaboration and productivity for employees by using technologies such as unified communications and social media. We report from Mobile World Congress on the latest trends. And we examine how mobile device management tools can help build a trusted BYOD policy. Read the issue now 
(EZINE) READ ABSTRACT |

Productivity, Mobility and Efficiency: Keeping Your Devices Secure by Cisco Systems, Inc.

November 07, 2012 - (Free Research)
In this research report, uncover how organizations are – or should be – responding to the invasion of mobile devices in the workplace, the emerging trends in enterprise mobility today, best practices for ensuring effective mobile policies, and much more! 
(WHITE PAPER) READ ABSTRACT |

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network by SearchMobileComputing

December 2008 - (Free Research)
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware. 
(EBOOK) READ ABSTRACT |

Mobile Device Management for Dummies by Sybase, an SAP company

May 2009 - (Free Research)
Mobile Device Management For Dummies is your guide to managing and securing mobile computing equipment such as laptops and handheld devices. You get the lowdown on enterprise mobile device management and how Sybase's Afaria solution can help you. 
(BOOK) READ ABSTRACT |

An effective mobile device security policy by McAfee, Inc.

November 2011 - (Free Research)
Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present. 
(EGUIDE) READ ABSTRACT |

Mobilizing Field Forces on Smartphones by BlackBerry

August 2009 - (Free Research)
This ABI Research white paper examines the use of smartphones as tools for mobile field workers as a replacement for rugged devices. Through interviews with multiple companies with we found that the TCO of owning smartphones was 14% - 85% less than rugged devices. 
(WHITE PAPER) READ ABSTRACT |

Essential Enterprise Mobile Security Controls by IBM

January 2013 - (Free Research)
How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data. 
(EGUIDE) READ ABSTRACT |

Centralized Management Key to Controlling Mobile Communications Cost by Digital Fairway, Inc.

November 2007 - (Free Research)
In this paper, learn why centralized policy management, automated order processing and asset management, and end-user self-service are key ingredients for any organization trying to control the proliferation of wireless mobile devices and spiraling costs. 
(WHITE PAPER) READ ABSTRACT |

June Issue of Information Security magazine: Mobile Security: A New Game Plan by Information Security Magazine

June 2011 - (Free Research)
This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges. 
(EZINE)

Five Calls to Make When Developing a Mobile Learning Strategy by SkillSoft Corporation

June 2011 - (Free Research)
Welcome to the exciting (and confusing) world of mobile learning. What are the five calls to make when developing a mobile learning strategy? Find out in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Expert Tips for SAP Mobility Initiatives by CSC

November 2012 - (Free Research)
In the still-young mobile market space, SAP shops lack best practices and go-to strategies that they can turn to when implementing enterprise mobility. Read this SearchSAP.com expert e-guide to check out four case studies of companies large and small that have seen success in their unique and varied approaches to SAP mobility. 
(EGUIDE) READ ABSTRACT |

McAfee Enterprise Mobility Management platform by McAfee, Inc.

May 2013 - (Free Research)
Learn how you can say "yes" to mobile productivity while still protecting your most valuable company data and assets. Learn how you can properly secure today's next-generation endpoint for business - the mobile device - with comprehensive authentication and encryption enforcement, remote device locking, secure containers, and more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 408 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts