Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 20 results from our White Paper Library

Sort By
Sybase

Mobile Device Management

An IT Manager’s Guide to Managing Personal Devices in the...

You can't avoid it any longer: A strategy for managing employees' personal mobile devices. Learn how to create a more secure and manageable mobile enterprise...


IronKey

Wireless Security

Technology Audit: IronKey Enterprise

IronKey Enterprise is a secure, encryption-based management solution for the protection of data that is copied to USB flash drives. Operating as removable...


BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


BlackBerry

Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.


Kaspersky Lab

Wireless Security

Enterprise Mobile Security Survey

Download the results from our Enterprise Mobile Security Survey to see how your own organization's security processes stack up against your peers…and where...


IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


CDW & Symantec

Identity Fraud & Theft

Data and Identity Security

This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve....


CDW & Symantec

Enterprise Data Privacy

Chief Information Security Officers Get Serious about Mobile...

This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure...


Tellabs

Wireless Technologies

4G: The What, Why and When

The development of 4G has seen widespread debate over its definition. This white paper clarifies the technological definition of 4G, presents business...


Previous 1
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?