Wireless Handheld Devices Reports

Mobile Security Software Keeps Corporate Data Safe
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Mobilizing Lotus Domino
sponsored by Sybase iAnywhere
WEBCAST: Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.
Posted: 06 Jun 2007 | Premiered: Apr 26, 2007, 09:00 EDT (13:00 GMT)

Sybase iAnywhere

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware

Best Practices for Mobile Development
sponsored by BlackBerry
WEBCAST: In this webcast, author Mike Kirkup tells about mobile development with their features and limitations and describes Smartphones which store data in the memory.
Posted: 12 Jan 2009 | Premiered: Jan 12, 2009

BlackBerry

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Do Mobile Users Need Full Desktop Access?
sponsored by VMware, Inc.
EGUIDE: In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

Overcoming CIO Challenges in Global Mobility Management
sponsored by BlackBerry
WHITE PAPER: This paper looks at some of the challenges that CIOs are facing in managing mobility. This is clearly becoming more complex for large enterprises as mobility penetrates more deeply into their organizations, driven by changing working practices and supported by rapidly evolving technology.
Posted: 19 Feb 2010 | Published: 01 Jul 2009

BlackBerry

OneBridge Mobile Groupware, 5.5
sponsored by Sybase iAnywhere
TRIAL SOFTWARE: Ensuring your wireless email and other data is secure anytime, anywhere is a challenge. OneBridge 5.5 can help you deliver vital data over any connection, to any device or using Lotus Domino.
Posted: 23 Aug 2006 | Premiered: 23 Aug 2006

Sybase iAnywhere

Best Practices for Globally Deploying Wireless Messaging
sponsored by Good Technology
WHITE PAPER: This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project.
Posted: 23 Apr 2007 | Published: 01 Apr 2007

Good Technology