Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Handheld Phones

RSS Feed    Add to Google    Add to My Yahoo!
Smart Handheld Phones Reports
 
Powerful Anti-Malware for Your Mobile Device
sponsored by Malwarebytes Corporation
WHITE PAPER: Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.
Posted: 07 May 2015 | Published: 07 May 2015


Busting myths about mobility: Why tablets are more than just companion devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at BYOD and mobile device management, exposing common myths about mobility and much more. Read on to learn more.
Posted: 06 Apr 2015 | Published: 26 Nov 2014

Dell, Inc. and Intel®

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

The Emerging Trends Driving Digital Business
sponsored by Gartner
WEBCAST: This exclusive Gartner presentation reveals several key trends that are driving the digital business in today's world.
Posted: 10 Jun 2015 | Premiered: Jun 10, 2015

Gartner

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: Access this white paper to learn everything you need to know about the current state of mobile security threats for both iOS and Android.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Lookout

Wireless Infrastructure Implementation: Best Practices
sponsored by Intel
WHITE PAPER: Access this white paper to discover best practices and best-known methods for architecting a wireless infrastructure within your organization. Follow these practices to help you quickly and efficiently replace wired LAN access services in your workspace with WLAN to provide employees with secure, reliable connections to mobile devices.
Posted: 19 Jun 2015 | Published: 28 Nov 2014

Intel

How to Leverage Mobile Management
sponsored by Absolute Software
WEBCAST: This brief webcast explores ways to leverage management for your employees' enterprised-enabled mobile devices. Tune in to learn about employee preferences for mobile technology as well.
Posted: 08 May 2015 | Premiered: May 8, 2015

Absolute Software

Do Mobile Enterprise Services Increase BYOD Initiatives' Chances of Success?
sponsored by IBM
RESEARCH CONTENT: This Forrester research report explores the impact of a leading company's mobile enterprise services on the success of BYOD initiatives in two large organizations.
Posted: 17 Jun 2015 | Published: 31 May 2013

IBM

Enterprise Mobility Management Without Investing in a New Solution
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can activate the EMM capabilities of your existing virtual private network (VPN) so that you can successfully manage mobile devices without migrating to a new system.
Posted: 11 Jun 2015 | Published: 29 May 2015

Pulse Secure

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement