Business of Information Technology  >   Business Processes  >   eCommerce  >  

Wireless Commerce

RSS Feed    Add to Google    Add to My Yahoo!
Wireless CommerceReports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This exclusive resource discusses an application delivery controller that is optimized for the intense new demands of today's network infrastructures, allowing your organization to provide workers with the resources they need.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix

Trusted Access:Mobile
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This exclusive paper discusses a mobile access solution that provides secure, reliable, and efficient access to critical data and applications from any mobile device.
Posted: 30 May 2014 | Published: 30 May 2014

Raytheon Trusted Computer Solutions

Enterprise mobility management: Embracing BYOD through secure app and data delivery
sponsored by Citrix
WHITE PAPER: This crucial paper discusses a mobile management solution that allows you to easily manage the ever-expanding diversity of mobile devices and platforms, expanding their value by focusing on managing business content.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

The Evolution of the Enterprise and Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This informative paper examines how the enterprise has evolved and how your security needs to evolve with it. Read on to find out more about the current state of enterprise security.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Smart enterprise mobility solutions are powered by Smart Containerization™
sponsored by CA Technologies.
WHITE PAPER: This informative white paper examines a technique called containerization, which allows you to keep enterprise data segregated in its own "container" so that you can apply security policies without affecting any data that isn't work related.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

CA Technologies.

11 Best Practices for Mobily Device Management
sponsored by IBM
WHITE PAPER: This informative resource examines how to construct an effective MDM plan, outlining 11 best practices that can help guarantee success.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

IBM

Mobile Device Management (MDM) Policies Best Practices Guide
sponsored by IBM
WHITE PAPER: This informative resource discusses how to create the most effective MDM policies by providing helpful best practices that have worked for numerous other successful organizations.
Posted: 15 May 2014 | Published: 15 May 2014

IBM

Newgen Mobility Article
sponsored by Newgen Software
WHITE PAPER: The following white paper provides readers with key applications of mobility platforms for banking and insurance industries.
Posted: 28 May 2014 | Published: 28 May 2014

Newgen Software

BYOD & Your Business: Managing the challenges with Unified Communications
sponsored by Windstream Communications
WEBCAST: This informative webcast discusses how a managed unified communication strategy can help your organization overcome the security, performance, and management challenges that come with BYOD, and discusses how your organization can keep your mobile workforce productive and collaborative.
Posted: 01 May 2014 | Premiered: May 1, 2014

Windstream Communications
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement