White Papers by Topic: Mobile technology

Resources available: 159

Delivering enterprise information securely on Android and Apple iOS tablets and smartphones

This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive technologies and best practices to ensure control and security without impairing productivity.

5 Tips to Prevent BYOD Pitfalls

Read our whitepaper on how to develop a successful BYOD program for your network and provide consistent access to corporate applications.

Together at Last: BYOD and Solid Security

Read this whitepaper to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.

Managing Exchange in a Post-PC World

A successful mobile deployment using ActiveSync depends on giving users a reliable, stable sync experience. But if any of the many moving parts in the EAS data path fail or degrade, the experience will suffer.

10 Tips for Successful BYOD

No longer is BYOD a disconnected project with a handful of users... In fact, it's becoming an industry standard. BYOD can deliver improved user productivity, engagement and satisfaction, not to mention cost savings.

Managing Large-Scale Mobile Deployments

As enterprise mobility becomes pervasive, service interruption can severely and adversely impact the bottom line.

Exchange & BYOD: Avoid Disaster, Plan for Success

Learn how careful planning, good operational processes as well as new techniques and tools can help organizations avoid these pitfalls and make BYOD work.

Security and BYOE - 3 Best Practices You Need to Know

When today's hacker and identity theft threats combine with the new challenges presented by the trend of BYOD, companies must take decisive action to deliver secure, flexible and convenient authentication to employees and their devices alike.

Secure Mobility Myth Buster

As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing myths instead of useful information. This document reviews the more common myths and misconceptions about secure mobility.

Security? Leave it to Me! Samsung KNOX

Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more.

©1994-2014 Infoworld, Inc.