Handheld Computing Devices Reports

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Mobility Mayhem: Balancing BYOD with Enterprise Security
sponsored by Code42
PRESENTATION: Join this exclusive webinar now to hear security experts dive deep into how BYOD impacts enterprise security strategies and provide practical tips for securing your mobile workforce.
Posted: 23 Oct 2013 | Published: 11 Dec 2013

Code42

The Promise of Mobile Unified Communications
sponsored by BlackBerry
WHITE PAPER: Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

BlackBerry

Mobile Unified Communications & Collaboration (UCC) on BlackBerry 10
sponsored by BlackBerry
WEBCAST: This webcast discusses the place of BlackBerry 10 in the move towards real-time enterprise collaboration and how they are working to definitively establish the right balance between personal workspace and the enterprise workspace on mobile desktops.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

BlackBerry

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.
Posted: 15 Jun 2007 | Published: 01 Oct 2006

BlackBerry

User-Based Licensing for Endpoint Protection and BYOD
sponsored by OpenText Security Solutions
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

OpenText Security Solutions

Best Practices for Globally Deploying Wireless Messaging
sponsored by Good Technology
WHITE PAPER: This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project.
Posted: 23 Apr 2007 | Published: 01 Apr 2007

Good Technology

ERP On the Go: Why Mobile Access is a Business Necessity
sponsored by Epicor Software Corporation
WHITE PAPER: This resource examines the significant advantages that your organization can gain with a strategy for mobile user access to ERP and other back office systems.
Posted: 06 Nov 2013 | Published: 31 Aug 2013

Epicor Software Corporation

Choosing an MDM System: Fundamental Features for Success
sponsored by Fiberlink
EGUIDE: This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.
Posted: 24 May 2013 | Published: 24 May 2013

Fiberlink

Mobile Device Management Technical Guide
sponsored by TechTarget Security
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security