Smart Handheld Devices Reports

Mobile World Congress 2019: The year 5G use cases got real
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.
Posted: 08 Feb 2021 | Published: 12 Mar 2019

TechTarget ComputerWeekly.com

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
Posted: 31 Mar 2014 | Published: 01 Apr 2014

TechTarget ComputerWeekly.com

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

Presenting the Full Panasonic ToughPad lineup
sponsored by Insight and Panasonic
WHITE PAPER: This exclusive resource discusses a series of touchscreen mobile devices engineered with enterprise-grade security, seamless connectivity and along legacy of reliable computing to empower your workforce with the capabilities they need to be productive and efficient.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Insight and Panasonic

Mobile Device Management Checklist
sponsored by Citrix
EGUIDE: This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Citrix

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Laptop security challenges: Will smartphones be their replacement?
sponsored by Dell and Microsoft
EGUIDE: Laptops face a number of security challenges, from no log-on requirements to blank and weak passwords. Download this e-guide to learn about laptop security issues that you may not have considered or that you might be looking at from the wrong perspective.
Posted: 18 May 2018 | Published: 17 May 2018

Dell and Microsoft

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM