Hardware  >   Computer Hardware  >   Personal Computers  >  

Tablets

RSS Feed    Add to Google    Add to My Yahoo!
TabletsWhite Papers (View All Report Types)
 
Detecting Cyber Attacks in a Mobile and BYOD Organization
sponsored by Vectra Networks
WHITE PAPER: This solution brief sets out to explore the challenges, understand the needs,evaluate mobile device management as an approach to detecting attacks. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

The Key to Unlocking What Your Customers Really Want
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out how the adoption of analytics can help companies better understand what their customers want, and promote upsell on new services.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Enterprise Mobility: Enable Productivity without Sacrificing Protection
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and discusses why your organization should embrace it. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Symantec Corporation

Best Practice Guide to Mobile Device Management
sponsored by IBM
WHITE PAPER: Uncover the top ten mobile device management (MDM) best practices that will help you control the mobile devices used in your workplace, reducing risks to corporate data without jeopardizing employee productivity.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

Mobile Security: Confidence Ebbs As BYOD Booms
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at how enterprise mobility has changed the network security landscape forever. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Dell, Inc. and Intel®

Transform your tablet to include personal and business assets
sponsored by NComputing
WHITE PAPER: This video will help you learn about a unified workspace solution designed to leverage cloud, hybrid and on-premise delivery models and optimize tablet-based app and file access.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

NComputing

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

Tailoring Enterprise Applications For Mobile Environments
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at tailoring enterprise applications for mobile environments. Read on to learn more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®

IDC: Device Proliferation and the Important Role of Thin Clients
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and how it's used in organizations to drive the best benefits possible. Read on to learn more.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Citrix

Gain Enterprise Mobility: Learn How Your Enterprise Can Become Mobile
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper now to learn more about overall trends in mobility; how enterprise mobility influences the workplace and changes the way in which IT is delivered and consumed; and how to implement mobility in your enterprise.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement