Mobility - Page 10

  • Your selection:
  • Tag: Mobility
  • Remove all
Refine Also By Tag: , Article Type: , Author: , …
  • Tag:
    • Security (123)
    • Mobile (94)
    • Smartphones (78)
    • Enterprise (74)
    • Management (65)
    • More
  • Article Type:
    • News (165)
    • Feature (45)
    • Opinion (31)
    • Analysis (29)
    • Review (14)
    • More
  • Author:
    • Kevin Parrish (46)
    • James Alan Miller (39)
    • Bill Oliver (24)
    • James Sullivan (22)
    • Wolfgang Gruener (19)
    • More
Previous Results 181-200 Of 343 Next
Sort by:
  • Updated SAP BusinessObjects Mobile App Launched
    Updated SAP BusinessObjects Mobile App Launched
    in News
    SAP's updated mobile app brings together multiple business intelligence (BI) and analytic applications from SAP into a single solution for iPhone and iPad. Read More
  • BlackBerry Intros Secure Work Space for iOS, Android
    BlackBerry Intros Secure Work Space for iOS, Android
    in News
    BlackBerry adds a new component called Secure Work Space, a security solution that separates work and personal apps and data on iOS and Android devices in a BYOD environment. Read More
  • A Guide to Employing Mobile Security
    A Guide to Employing Mobile Security
    in Feature
    Smartphones, tablets and other mobile devices have become indispensable in our daily lives. Learn how to securely integrate these devices into your organization's infrastructure. Read More
  • VIDEO: What's a Virtual Phone?
    VIDEO: What's a Virtual Phone?
    in Video
    The Mobile Virtualization Platform (MVP) is on the horizon. VMware has been hard at work developing virtualization software that allows a single mobile phone to run multiple operating systems. Read More
  • How to Get Mobility Right: Resources for BYOD
    How to Get Mobility Right: Resources for BYOD
    in Opinion
    Whether you have a BYOD policy or not, your end-users are accessing work related data on their own mobile devices. Learn how to plan, enable, protect, support and empower your users to get mobility right. Read More
  • VIDEO: How To Secure Your iPad and iPhone
    VIDEO: How To Secure Your iPad and iPhone
    in Video
    In this video, Mikhael shows you how to quickly secure your iPad, iPhone and iPad Touch. Read More
  • VIDEO: How Secure Are Your Mobile Devices?
    VIDEO: How Secure Are Your Mobile Devices?
    in Video
    Enterprise mobile devices are proliferating like rabbits in the spring. Rachel Rosmarin tells you how to keep them under control. Read More
  • VIDEO: Mobile Management Security Policies
    VIDEO: Mobile Management Security Policies
    in Video
    BYOD is quickly becoming the norm in today's workplace, bringing with it a host of new security concerns. Have you implemented a mobile device security policy for your organization? Get started today. Read More
  • VIDEO: Putting Mobile Management to Work
    VIDEO: Putting Mobile Management to Work
    in Video
    Here's an interesting statistic: 75% of employees already use their own devices to access work-related data -- whether you have a mobile management solution in place or not. Read More
  • Citrix Releases Key Software Update to NetScaler 10
    Citrix Releases Key Software Update to NetScaler 10
    in News
    Citrix announces a new software release for NetScaler 10 with TriScale technology, a cloud networking platform focused on increasing security and enhancing the mobile user's experience. Read More
  • Citrix Announces New Cloud Solutions Centered Around Mobility
    Citrix Announces New Cloud Solutions Centered Around Mobility
    in News
    Citrix reveals new cloud solutions that allow customers to mobilize their businesses, including XenDesktop 7, enterprise edition of XenMobile and ShareFile StorageZone Connectors. Read More
  • Citrix Announces New StorageZone Options
    Citrix Announces New StorageZone Options
    in News
    Citrix Systems reveals new Citrix ShareFile StorageZone Connectors for Microsoft SharePoint and network drives at Citrix Synergy 2013. Read More
  • Spiceworks Teams Up with Fiberlink for Free MDM Solution
    Spiceworks Teams Up with Fiberlink for Free MDM Solution
    in News
    Spiceworks partners up with Fiberlink to help enhance their next release of Spiceworks 7, with the highly rated MaaS360 Mobile Device Management solution. Read More
  • Absolute Software Introduces CompuTrace Mobile Theft Management for iOS
    Absolute Software Introduces CompuTrace Mobile Theft Management for iOS
    in News
    Absolute Software, a Vancouver based company, announced their launch of Computrace Mobile Theft Management (MTM), a unique recovery solution for iPads and iPad Minis. Read More
  • Samsung "Knox" It Out of the Park for the DoD
    Samsung "Knox" It Out of the Park for the DoD
    in News
    The U.S. Department of Defense gives the go ahead to use Samsung Knox-enabled Android devices, which incorporate NSA's Security Enhancement (SE) technology. Read More
  • Corporate Data Hogs: 12 Facts about Mobile Data Consumption
    Corporate Data Hogs: 12 Facts about Mobile Data Consumption
    in Slideshow
    Who are the biggest corporate data hogs? In the age of BYOD, the results can be striking and costs do keep rising as mobile workers consume more and more data. Read More
  • Samsung Delays Android Security Software
    Samsung Delays Android Security Software
    in News
    Samsung has reportedly moved the launch date of a highly anticipated security software for its Android phones to July, 2013. Read More
  • Facebook Buys Mobile App Infrastructure Service Provider Parse
    Facebook Buys Mobile App Infrastructure Service Provider Parse
    in News
    Facebook’s latest acquisition of Parse will give it a foot in the door to providing back-end services for cloud data storage, notifications and user management to app makers. Read More
  • Mobile Security Glossary - Sponsored by CDW
    Mobile Security Glossary - Sponsored by CDW
    in Sponsored
    This glossary, brought to you by CDW, serves as a quick reference guide to some of the essential terms in mobile security. Read More
  • A Guide to BYOD Policy: Planning and Risk Mitigation
    A Guide to BYOD Policy: Planning and Risk Mitigation
    in Analysis
    Understanding BYOD and its impact on an existing organization and infrastructure is a critical milestone in the adoption of employee-owned devices that will allow a business to make the best use of cloud computers, smartphones, super phones and tablets. Read More
    • First
    • Previous
    • 10 / 18
    • 11
    • 12
    • 13
    • 14
    • More pages
    • Next