Handheld Computing Devices Reports

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

BlackBerry Device Software v4.5
sponsored by BlackBerry
TRIAL SOFTWARE: Upgrading to BlackBerry® Device Software v4.5 opens up a whole new world of features and functionality.
Posted: 01 Oct 2008 | Premiered: 01 Oct 2008

BlackBerry

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Mobilizing Lotus Domino
sponsored by Sybase iAnywhere
WEBCAST: Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.
Posted: 06 Jun 2007 | Premiered: Apr 26, 2007, 09:00 EDT (13:00 GMT)

Sybase iAnywhere

Best Practices for Globally Deploying Wireless Messaging
sponsored by Good Technology
WHITE PAPER: This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project.
Posted: 23 Apr 2007 | Published: 01 Apr 2007

Good Technology

BYOD: An Opportunity for IT Evolution
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

TechTarget Security

Best Practices for Managing Endpoints in the Era of Consumerization
sponsored by TechTarget Mobile Computing
EBOOK: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

TechTarget Mobile Computing

Do Mobile Users Need Full Desktop Access?
sponsored by VMware, Inc.
EGUIDE: In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

The Cost and Benefits of BYOD
sponsored by TechTarget Security
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

TechTarget Security

CRM for the Professional on the Go
sponsored by BlackBerry
WHITE PAPER: Mobile CRM is something that needs to be considered now. As a business leader, you might have put it into your mental to do later box, but the reasons to make it a priority are compelling. Read this paper to discover why.
Posted: 01 Sep 2008 | Published: 25 Dec 2006

BlackBerry