Handhelds Reports

Protection for Every Enterprise: How BlackBerry 10 Security Works
sponsored by BlackBerry
WHITE PAPER: If you're choosing a platform for enterprise-grade mobile device management, security probably tops your list of requirements. Learn how BlackBerry Enterprise Service 10 can help you secure and manage not only BlackBerry devices, but iOS and Android devices as well, enabling the cross-platform mobility management you need.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

BlackBerry

BoxTone: Mobile User Management with ITIL and ITSM
sponsored by BoxTone
WHITE PAPER: This White Paper outlines the capabilities of Mobile User Management developed by BoxTone -- which for many of the best-known organizations are enabling improvements and efficiencies in responsiveness to mobile users, process, measurability, service...
Posted: 15 Apr 2008 | Published: 15 Apr 2008

BoxTone

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption
sponsored by BlackBerry
WHITE PAPER: This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.
Posted: 08 Nov 2007 | Published: 08 Nov 2007

BlackBerry

BlackBerry Wireless Enterprise Activation
sponsored by BlackBerry
WHITE PAPER: This document describes how administrators can enable wireless enterprise activation for users on the BlackBerry Enterprise Server™, and how users can initiate wireless enterprise activation from their handhelds.
Posted: 11 Aug 2006 | Published: 01 Jan 2004

BlackBerry

Weighing the Options for an Enterprise Mobility Strategy
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Making Sense of the Wireless World - BlackBerry for Wireless LAN
sponsored by BlackBerry
WHITE PAPER: This white paper reviews past and present technologies including a discussion of circuits and packets and also compares WLAN and WWAN networks in terms of advantages, challenges, and issues to consider when considering a wireless solution.
Posted: 05 Feb 2006 | Published: 01 Jan 2005

BlackBerry

Developing an Effective Corporate Mobile Policy
sponsored by BlackBerry
WHITE PAPER: By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
Posted: 19 Jun 2008 | Published: 01 Jun 2008

BlackBerry

OneBridge Mobile Groupware, 5.5
sponsored by Sybase iAnywhere
TRIAL SOFTWARE: Ensuring your wireless email and other data is secure anytime, anywhere is a challenge. OneBridge 5.5 can help you deliver vital data over any connection, to any device or using Lotus Domino.
Posted: 23 Aug 2006 | Premiered: 23 Aug 2006

Sybase iAnywhere

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future
sponsored by Intermec
WHITE PAPER: This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future.
Posted: 12 May 2011 | Published: 12 May 2011

Intermec

Mobile Device Management Live Chat
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

TechTarget Security