Handhelds Reports

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Best Practices for Mobile Development
sponsored by BlackBerry
WEBCAST: In this webcast, author Mike Kirkup tells about mobile development with their features and limitations and describes Smartphones which store data in the memory.
Posted: 12 Jan 2009 | Premiered: Jan 12, 2009

BlackBerry

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

MDM Software: Benefits of Mobile Configuration Management
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware

A Mobile Application Management Primer for IT
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

TechTarget Security

Mobility Mayhem: Balancing BYOD with Enterprise Security
sponsored by Code42
PRESENTATION: Join this exclusive webinar now to hear security experts dive deep into how BYOD impacts enterprise security strategies and provide practical tips for securing your mobile workforce.
Posted: 23 Oct 2013 | Published: 11 Dec 2013

Code42

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Do Mobile Users Need Full Desktop Access?
sponsored by VMware, Inc.
EGUIDE: In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.