Mobile Devices Whitepapers


Sort by: Date | Company | Title


7 must haves for mobile app security
By Good Technology | 20/8/2014
Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity. Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices.
Download this now


When mobile device management isn't enough
By Good Technology | 20/8/2014
The explosion of smartphones and tablets in the workplace means that confidential information is now not only spread throughout your organization on servers and desktops, it is also being stored on mobile devices – which are prone to loss or theft – and being transmitted from these mobile devices beyond the control of your organization. It is easy for employees to disseminate – whether accidentally or intentionally – sensitive business data outside the organization with a simple action – e.g., upload employee healthcare records to the public cloud via a cloud storage app.
Download this now


Secure Mobile Access to Corporate Applications
By F5 Networks | 13/7/2014
The way corporations operate around mobile devices is currently shifting—employees are starting to use their own devices for business purposes, rather than company-owned devices. With no direct control of the endpoints, IT departments have generally had to prohibit this or risk insecure access inside the firewall. But as more mobile devices appear on the corporate network, mobile device management has become a key IT initiative.
Download this now


How to Transform Your Mobile Customer Care Strategy
By Oracle | 27/3/2014
It’s all about the SCI: the smart, connected interaction. Walk down your own unique path and connect with your customers through their mobile devices. It’s not easy - mobility increases the number of variables going into each interaction, requires the preservation of context as interactions across channels, but it allows each interaction to naturally evolve. Read this document to learn how to go SCI and naturally connect with your customers.
Download this now


VDI your users will love
By Citrix Systems Asia Pacific | 25/3/2014
Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. Read on to find out how you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.
Download this now


Taking Windows mobile on any device
By Citrix Systems Asia Pacific | 25/3/2014
The ability to take Windows applications and desktops mobile has many advantages, but the variation in mobile device types, including form factor and platform, makes the process of identifying a single solution to address all the employees’ requirements complex. What strategies should you consider to address this challenge?
Download this now


Secure application delivery for a mobile workforce
By Citrix Systems Asia Pacific | 25/3/2014
Mobility has given people new freedom to work anywhere, at any time - but it has also brought endless complications for IT. We show you how you can empower people to use Windows applications and native mobile apps on any type of device - with full security.
Download this now


Together at Last: BYOD and Solid Security
By Good Technology | 13/2/2014
Employees want to use their own mobile devices, which is often met with IT resistance. But there’s no need for conflict! Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to BYOD, while still providing rock-solid enterprise security.
Download this now


Future of business 2013 Government Insights Paper
By Optus | 10/2/2014
This Government Insights Paper is part of a larger business and consumer survey conducted by Stancombe Research + Planning for the Optus Future of Business Report 2013. Download to gain access to key drivers and insights into the challenges and trends facing governments transforming to digital delivery of services.
Download this now


The Wild, Wild West of Mobile Apps
By Webroot | 7/1/2014
How MDM vendors, carriers, service providers and app stores can protect users from malicious mobile apps In this white paper, we will look at: 1. Why mobile attacks are exploding. 2. Options for protecting against malicious mobile apps. 3. The newest defense: mobile app reputation services. 4. The Webroot Mobile App Reputation Service.
Download this now