Mobile and Wireless Device Management Software Reports

Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

How to Handle the Mobile Revolution
sponsored by bigtincan information
WHITE PAPER: This exclusive paper discusses a mobile tool that allows you to distribute secure, relevant content, documents and information to a vast number of users on smart mobile devices, HTML5 capable web browsers, and traditional desktop or laptop computers.
Posted: 02 May 2014 | Published: 02 May 2014

bigtincan information

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Leadership and Technology: Mobility and bring-your-own-device insights for Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative white paper examines the power of mobile computing as part of the midmarket enterprise's unified communications platform, analyzing how you can utilize enterprise mobility effectively without increasing the pressure on IT.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Cisco Systems, Inc.

The Next Mobility Model: COPE Challenges BYOD
sponsored by TechTarget Mobile Computing
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

TechTarget Mobile Computing

Reality Check(list): Mobile Enterprise Buyer’s Guide
sponsored by Citrix
WHITE PAPER: Before implementing a mobility strategy, IT leaders must consider the various use cases and technologies that address each need. This mobile buyer's guide can help your organization identify the solutions that make sense for your end users' unique requirements.
Posted: 14 May 2014 | Published: 14 May 2014

Citrix

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Mobile Device Management Buyers Guide
sponsored by Sophos
WHITE PAPER: This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos

Enterprise Mobility Management Envelops Data as Well as Devices
sponsored by TechTarget Mobile Computing
EBOOK: IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices. Access this expert white paper for essential tips and tricks to mobile management in the modern world.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

TechTarget Mobile Computing

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by TechTarget Mobile Computing
EBOOK: Enterprise mobility management (EMM) it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Read on to learn about the role EMM should play in your mobile strategy.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TechTarget Mobile Computing