Smart Handheld Phones Reports

Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 May 2018

TechTarget ComputerWeekly.com

Move Beyond Point Solutions to Complete EMM
sponsored by Citrix
WEBCAST: This informative webcast discusses the problems associated with point solutions and examines how and why your organization should move past these tools to a complete enterprise mobility management (EMM) solution.
Posted: 13 May 2014 | Premiered: May 13, 2014

Citrix

What is this 'File Sync' Thing and Why Should I Care About It
sponsored by Dropbox for Business
WHITE PAPER: This exclusive paper discusses the importance of file sync technology in the mobile era, examining how your organization can significantly increase collaboration, communications, and productivity.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Dropbox for Business

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

TechTarget ComputerWeekly.com

Mobile CRM: Conquering the Data Integration Challenge
sponsored by Microsoft
EGUIDE: Without an effective way to integrate data from disparate systems, your mobile CRM can't help you optimize the customer experience. This expert guide explores how companies have overcome their data integration challenges to improve their mobile CRM.
Posted: 24 Feb 2016 | Published: 16 Feb 2016

Microsoft

Unlock the value of BYOD: Go mobile without sacrificing security
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM