Smart Handheld Phones Reports

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Defend Your Mobile Applications with Citrix NetScaler
sponsored by Citrix
RESOURCE: This exclusive resource examines a mobile workspace enablement solution that can help your business securely deliver applications, desktops, data, and other services to any device on any network or cloud.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Citrix

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Unified workspace: Using your tablet for personal and business applications
sponsored by NComputing
VIDEO: Tablets are a great tool to allow employees access to business files and applications, without being tied to a physical desktop. Find out how a leading vendor can transform a tablet so users can have seamless tablet access to everything they need including business applications and files, without breaking budget or resources.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

Meaningful Use Requires Choosing the Ideal Devices for Your Clinicians
sponsored by Connection
WHITE PAPER: This white paper outlines a clinical device assessment service that uses 3-step process to help you choose the right mobile device plan to support your EMR transition model.
Posted: 02 May 2014 | Published: 31 Dec 2013

Connection

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
Posted: 31 Mar 2014 | Published: 01 Apr 2014

TechTarget ComputerWeekly.com

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

Unlock the value of BYOD: Go mobile without sacrificing security
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

Skype for Business: Preparing Your Organization for Deployment
sponsored by Dimension Data
EGUIDE: This expert e-guide explains what you need to know before diving into a Skype for Business deployment. Access now to learn how to prepare your infrastructure and organization by taking a hybrid approach to deployment that focuses on end-user training and adoption.
Posted: 02 Sep 2016 | Published: 01 Sep 2016

Dimension Data

How to get more from BYOD
sponsored by Cisco
WHITE PAPER: This exclusive paper examines a set of mobile solutions designed to enable BYOD environments by combining best-of-class technology, validated designs, and end-to-end support.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Cisco