Wireless Mobile Computing Device Management Software Reports

Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

Mobile Device Management Buyers Guide
sponsored by Sophos
WHITE PAPER: This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by TechTarget Security
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

TechTarget Security

There's an App Store for That: Stock Your Mobile Workers with the Right Resources
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, you will discover how to develop, provision, and manage mobile apps through an individualized enterprise app store built on a secure portal. Access this e-zine now to learn how deploying your own app store cuts down on the problems that arise with public stores.
Posted: 08 May 2015 | Published: 08 May 2015

TechTarget Mobile Computing

Taking the Enterprise Mobile: An Executive Checklist
sponsored by Citrix
WHITE PAPER: This crucial resource examines a mobile management solution that enables your organization to deliver all of your business critical information over mobile while safeguarding corporate IP, customer and employee data, non-public financial information and business intelligence.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority

Maintaining Control Over Mobility and the Cloud
sponsored by TechTarget Mobile Computing
EBOOK: Access this expert guide to learn about the basics of how mobile devices will impact your enterprise data, and what you have to do to stay ahead of dangerous mishaps.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

TechTarget Mobile Computing

How a unified workspace solution is built for hybrid environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

CYOD: Hassle Free BYOD
sponsored by Insight
WHITE PAPER: This informative resource discusses a new approach to BYOD where employees choose their own device from a menu of pre-approved devices and plans, helping ease the burden of management for IT and allowing for improved efficiency.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Insight

Defend Your Mobile Applications with Citrix NetScaler
sponsored by Citrix
RESOURCE: This exclusive resource examines a mobile workspace enablement solution that can help your business securely deliver applications, desktops, data, and other services to any device on any network or cloud.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Citrix