PocketPC Reports

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Flexible Work: Rhetoric and Reality
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Experts have been predicting an explosion in the mobile workforce trend for years, to learn more about this trend Citrix Online and the Work Design Collaborative joined forces to conduct a survey about trends in flexible work policies and technology.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

Best Practices for mobile authentication
sponsored by TechTarget Security
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

Help Secure and certify your mobile Ecosystem
sponsored by AT&T Corp
WHITE PAPER: Mobility is transforming the way we conduct business, introducing significant security considerations that require upfront planning.  Uncover suggestions on how to promote a secure mobile ecosystem as this white paper discusses security standards and considerations.  
Posted: 16 Jun 2011 | Published: 16 Jun 2011

AT&T Corp

Accessing BlackBerry Data Services Using Wi-Fi Networks
sponsored by BlackBerry
WHITE PAPER: Find out how you can complete multiple tasks at once to increase productivity by accessing both wireless and Wi-Fi networks together using the BlackBerry 8820 Smartphone.
Posted: 02 Aug 2007 | Published: 23 Jul 2007

BlackBerry

E-Guide: Best Practices to ensure secure mobile communication
sponsored by TechTarget Security
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

JobClock
sponsored by Exaktime
HARDWARE LISTING: JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine and each worker carries keytabs on their own keyring that identifies them in the system.
Posted: 15 May 2008 | Published: 01 May 2008

Exaktime

Mobile Device Management Checklist
sponsored by TechTarget Security
EGUIDE: This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

TechTarget Security

The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007

GFI Software

Mobilizing Field Forces on Smartphones
sponsored by BlackBerry
WHITE PAPER: This ABI Research white paper examines the use of smartphones as tools for mobile field workers as a replacement for rugged devices. Through interviews with multiple companies with we found that the TCO of owning smartphones was 14% - 85% less than rugged devices.
Posted: 06 Aug 2009 | Published: 06 Aug 2009

BlackBerry