Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Telephones

RSS Feed    Add to Google    Add to My Yahoo!
Smart Telephones Reports
 
Protecting your Customers’ Online Banking Transactions
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Five Security Concerns with Mobile Payment Systems
sponsored by Global Knowledge
WHITE PAPER: This white paper details the 5 security concerns you should keep in mind before linking your finances to a mobile payment solution.
Posted: 31 Mar 2015 | Published: 10 Mar 2015

Global Knowledge

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Apps to the Future: Predicting Enterprise Mobility in 2015
sponsored by Maas360 by IBM
WEBCAST: This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.
Posted: 24 Feb 2015 | Premiered: Feb 24, 2015

Maas360 by IBM

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Selecting Your Enterprise Mobility Management Solution
sponsored by Maas360 by IBM
WHITE PAPER: This report will tell you how each mobile management product performed on a variety of criteria and help you choose the one that's best for your organization.
Posted: 13 Mar 2015 | Published: 17 Sep 2014

Maas360 by IBM

Gain Enterprise Mobility: Learn How Your Enterprise Can Become Mobile
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this white paper now to learn more about overall trends in mobility; how enterprise mobility influences the workplace and changes the way in which IT is delivered and consumed; and how to implement mobility in your enterprise.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Enterprise

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Research Report Reveals Mobile Device Management Solutions
sponsored by Maas360 by IBM
WHITE PAPER: This research report presentsthe results of several tests conducted on MDM and EMM products and reveals who the leaders in the field are.
Posted: 13 Mar 2015 | Published: 17 Sep 2014

Maas360 by IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement