Hardware  >   Computer Hardware  >   Personal Computers  >  

Tablet Computers

RSS Feed    Add to Google    Add to My Yahoo!
Tablet ComputersWhite Papers (View All Report Types)
 
Embracing Secure BYOD. What you need to know
sponsored by Acronis
WHITE PAPER: This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.
Posted: 22 Jul 2014 | Published: 31 Jan 2014

Acronis

IDC MarketScape: Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
sponsored by Citrix
WHITE PAPER: This exclusive resource provides an in-depth vendor comparison that can provide you with the information needed to make an EMM provider. Read on to learn more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Citrix

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Simply deploy, manage and secure mobile apps from the cloud
sponsored by IBM
WHITE PAPER: View this brief paper that introduces a mobile application management suite that delivers an easy-to-use enterprise app catalog with full security and operational lifecycle management of apps. Learn how this system is ideal for security sensitive data, especially in this BYOD era.
Posted: 08 Sep 2014 | Published: 28 Feb 2013

IBM

Mobility and Beyond: How to Achieve EMM Bliss
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at an enterprise mobility management solution that delivers the full package. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

BlackBerry

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

Dell Business Phone Enables BYOD
sponsored by Dell Software
WHITE PAPER: Increase productivity on personal mobile devices while enabling your enterprise to retain control and security. Give employees a separate business phone line on their personal devices, plus the robust business phone capabilities they need for work. Read the datasheet for details.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell Software

Choosing a Secure Workspace Approach
sponsored by Dell Software
WHITE PAPER: Learn how to choose a secure workspace solution that enables you to maintain security, reduce IT complexity and still deliver the responsiveness and flexibility your employees need for anytime, anywhere productivity. Read this insightful white paper for details.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell Software

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

Enterprise Management: The Explosion of Mobility
sponsored by Fiberlink
WHITE PAPER: This exclusive resource takes an in-depth look at what it takes to build a successful mobile environment today and what management tools and strategies your organization can utilize in order to increase productivity, efficiency, and employee satisfaction.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Fiberlink
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement