Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

SHD

RSS Feed    Add to Google    Add to My Yahoo!
SHDReports
 
Know the big three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines you how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Part 2: Six Steps to a Solid Mobility Policy in 2014
sponsored by Fiberlink
WEBCAST: In the second installment of this three-part series, discover six crucial recommendations for building a strong mobile policy that utilizes the latest trends, such as BYOD, and technologies to allow your employees to be productive on any device while keeping mobile data secure.
Posted: 03 Mar 2014 | Premiered: Mar 3, 2014

Fiberlink

Enterprise Mobility Best Practices - 2017 Analysts’ Predictions
sponsored by Fiberlink
WEBCAST: This exclusive webinar takes an in-depth look at mobile enterprise management (MEM) and how you can future proof your mobile management strategy and solutions, allowing you to keep getting the most value from your mobile workforce, even as technologies and trends shift.
Posted: 03 Mar 2014 | Premiered: Mar 3, 2014

Fiberlink

Cisco BYOD Smart Solution
sponsored by Cisco
WHITE PAPER: This exclusive paper examines a set of mobile solutions designed to enable BYOD environments by combining best-of-class technology, validated designs, and end-to-end support.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Cisco

Mobile infrastructure self-assessment
sponsored by IBM
ASSESSMENT TOOL: This informative resource provides a helpful self-assessment so you can identify areas where you can improve the IT infrastructure that supports mobility within your organization so you can enhance your mobile environment.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

How Red Robin Gourmet Burgers Nailed Mobile Engagement: A Case Study
sponsored by Citrix
CASE STUDY: This crucial case study examines a restaurant that utilizes mobile devices to enhance and streamline customer engagement to boost productivity and user satisfaction. Read on to learn how your organization can achieve similar results.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Deploying the Right Technology for Today's Mobile World
sponsored by RingCentral
WHITE PAPER: This Frost & Sullivan report outlines a key solution that enables mobile workers to experience constant access to business assets while using personal devices. Click through to learn how cloud-based communications services can reduce risk and high cost factors.
Posted: 17 Feb 2014 | Published: 17 Feb 2014

RingCentral
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
SHD White Papers | SHD Multimedia | SHD IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement