Mobile Device Security Reports

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

TechTarget Security

Mobile Device Management Technical Guide
sponsored by TechTarget Security
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Technical Guide on Mobile Security
sponsored by TechTarget Security
EGUIDE: Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Weighing the Options for an Enterprise Mobility Strategy
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

User-Based Licensing for Endpoint Protection and BYOD
sponsored by OpenText Security Solutions
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

OpenText Security Solutions

Increasing the ROI of Mobility
sponsored by Sybase, an SAP company
WHITE PAPER: Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.
Posted: 08 May 2009 | Published: 08 May 2009

Sybase, an SAP company

10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER: Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006

Sybase iAnywhere

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Transcript: Covering the basics in MDM? Why it’s time to advance your strategy
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!
Posted: 07 Nov 2012 | Published: 07 Nov 2012

BlackBerry