Mobile Workers Reports

The State of Healthcare Data
sponsored by HP & Intel®
WHITE PAPER: As health IT environments grow in complexity many are making strides to consolidate their infrastructures while making use of mobility, cloud, and EHRs. This white paper highlights survey results demonstrating the opportunities present in the new health care IT environment.
Posted: 03 May 2013 | Published: 03 May 2013

HP & Intel®

Solving the Challenges of BYOD
sponsored by TechTarget Security
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

TechTarget Security

It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

The New World of Mobility Management
sponsored by Aruba Networks
WHITE PAPER: This resource offers key information IT professionals can use to set their plans for mobility on the right track. Read on to discover the 3 phases to mobilizing a business, the functions of Enterprise Mobility Management, and a Mobile Management needs checklist.
Posted: 23 Apr 2013 | Published: 31 Mar 2013

Aruba Networks

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by TechTarget Security
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

TechTarget Security

Collaboration Services: Decision Criteria and 10 Questions to Ask Your Potential Collaboration Vendors
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com details the ten questions you should ask any potential collaboration vendor and offers a five-step process that will help you pick out the best products to create your collaboration architecture.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

TechTarget Security

Upgrading Wireless Networks in the Hospital
sponsored by TechTarget Health IT
EZINE: Explore this health IT tech guide for expert advice to help you build an effective and HIPAA-compliant wireless network. Learn more about implementing UC in a hospital setting, managing medical and mobile devices and preparing your wireless network for EHR, PACS and telemedicine.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

TechTarget Health IT

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

iPad in Business: iOS Deployment
sponsored by Apple Inc.
WEBCAST: In this two-part online seminar, you'll learn about deploying iPhone and iPad in business environments. Learn different approaches to deployment, configuration and management options, device management solutions and app deployment.
Posted: 12 Apr 2013 | Premiered: Apr 25, 2013

Apple Inc.

Beyond Business as Usual: The Mega Shift Toward Social Communications
sponsored by IBM
WHITE PAPER: Discover how integrating social software with communications is transforming the modern workplace, maximizing the potential of human capital, and generating value for businesses worldwide.
Posted: 09 Apr 2013 | Published: 02 Oct 2012

IBM

The Future of Email and Applications is Social
sponsored by IBM
WHITE PAPER: The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.
Posted: 05 Apr 2013 | Published: 28 Feb 2013

IBM

Mobile Application Management in the BYOD Era
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

TechTarget Security

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Mobile device controls: MDM security features vs. mobile native security
sponsored by TechTarget Security
WHITE PAPER: When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

TechTarget Security

Mobile Device Management Systems Help Mitigate BYOD Risks
sponsored by TechTarget Security
EGUIDE: This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

TechTarget Security

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Mobile EndPoint Security and Management - Best Practices
sponsored by TechTarget Security
EGUIDE: Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

TechTarget Security

Mobile Device Management Technical Guide
sponsored by TechTarget Security
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Weighing the Options for an Enterprise Mobility Strategy
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget ComputerWeekly.com

Computer Weekly – 5 March 2013: Planning for a 4G future
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now.
Posted: 04 Mar 2013 | Published: 05 Mar 2013

TechTarget ComputerWeekly.com

Expert E-Guide: How IT Consumerization Blends Personal and Business
sponsored by OpenText Security Solutions
EGUIDE: Here are six ways your organization can embrace consumerization. Get some helpful tips for working with end-users, focusing IT's role, avoiding "crapplications", and more.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

OpenText Security Solutions

Choosing & Managing Mobile Devices - Ch.1: Avoiding Challenges in Mobile Device Management
sponsored by TechTarget Security
WHITE PAPER: The rapidly evolving BYOD trend is making management strategies harder and harder to follow through on. Read this expert whitepaper to examine the critical data security and employee-related challenges IT faces with attempting to manage mobile devices.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

TechTarget Security

March Pulse E-Zine
sponsored by TechTarget Health IT
EZINE: Specialists like radiologists try to fit their RIS into the EHR criteria. It's a bit like fitting a square peg into a round hole.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Health IT