Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Telephones

RSS Feed    Add to Google    Add to My Yahoo!
Smart TelephonesReports
 
CSC MyWorkStyle: The Next Generation Workforce
sponsored by CSC
WEBCAST: This exclusive webcast details a suite of mobile solutions that can solve key problems for EMM. Read on to learn more.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

CSC

Best Practices for Beginning A Mobile Device Management Strategy
sponsored by Reddo Mobility
EGUIDE: View this expert e-guide to learn how you may already have a mobile strategy in place and why you may not need enterprise mobile management (EMM). Explore 10 questions to determine where your organization stands and how to proceed with your mobile strategy
Posted: 08 Dec 2014 | Published: 05 Nov 2014

Reddo Mobility

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

The Forrester Wave™: Enterprise Mobile Management, Q3 2014
sponsored by Symantec Corporation
WHITE PAPER: This exclusive vendor comparison from research professionals at Forrester details key takeaways of many mobile management providers. Read on to learn more.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Symantec Corporation

Expert Tips for a Successful BYOD Security Policy
sponsored by 1e Inc
EGUIDE: This exclusive e-guide offers an in-depth look at BYOD security policies and best practices. Read on to learn more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

1e Inc

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Enterprise Data Access on Mobile Devices
sponsored by Dell Software
WHITE PAPER: Discover how to build on the capabilities of Exchange ActiveSync, and boost employee productivity, enhance manageability and increase security. Read this white paper to learn about an evolutionary solution that meets the demands of today's mobile computing world.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement