Hardware  >   Networking Hardware  >   Wireless Hardware  >  

Device Platforms

RSS Feed    Add to Google    Add to My Yahoo!
Device Platforms Reports
How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012


Choosing & Managing Mobile Devices - Ch.1: Avoiding Challenges in Mobile Device Management
sponsored by SearchSecurity.com
WHITE PAPER: The rapidly evolving BYOD trend is making management strategies harder and harder to follow through on. Read this expert whitepaper to examine the critical data security and employee-related challenges IT faces with attempting to manage mobile devices.
Posted: 01 Mar 2013 | Published: 01 Mar 2013


Mobile Unified Communications & Collaboration (UCC) on BlackBerry 10
sponsored by BlackBerry
WEBCAST: This webcast discusses the place of BlackBerry 10 in the move towards real-time enterprise collaboration and how they are working to definitively establish the right balance between personal workspace and the enterprise workspace on mobile desktops.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013


Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Mobile Device Management Live Chat
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013


Top 3 Questions for Mobile Computer Purchases
sponsored by Intermec
WHITE PAPER: This white paper provides the top three questions you must ask before making a mobile computer purchase.
Posted: 25 Oct 2007 | Published: 01 Mar 2007


BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange
sponsored by BlackBerry
WEBCAST: View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.
Posted: 12 Mar 2008 | Premiered: Mar 12, 2008, 09:00 EDT (13:00 GMT)


User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013


Mobile Device Management for Dummies
sponsored by Sybase, an SAP company
BOOK: Mobile Device Management For Dummies is your guide to managing and securing mobile computing equipment such as laptops and handheld devices. You get the lowdown on enterprise mobile device management and how Sybase's Afaria solution can help you.
Posted: 08 May 2009 | Published: 08 May 2009

Sybase, an SAP company
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement