Portable Computing Reports

Blackberry Enterprise Server for Novell GroupWise
sponsored by BlackBerry
PRODUCT LITERATURE: The collaboration client that was previously named BlackBerry® Instant Messaging for Novell® GroupWise® Messenger is now named the BlackBerry® Client for Novell® GroupWise® Messenger.
Posted: 27 Feb 2009 | Published: 25 Feb 2009

BlackBerry

Building Mobility into Your Network
sponsored by NETGEAR Inc.
WHITE PAPER: Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

NETGEAR Inc.

Next-Generation WAN Optimization Is Happening Now
sponsored by BlueCoat
WHITE PAPER: Discover what Forrester Consulting is saying about next generation WAN optimization in this technology adoption profile commissioned by Blue Coat.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

BlueCoat

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam
sponsored by MessageLabs Symantec Hosted Solutions
WHITE PAPER: Todays wireless work environment poses new challenges for IT departments who must monitor and secure the online interactions of highly distributed and roaming workers. Companies are calling on security experts who can help organizations more effectively manage and protect their distributed workforce via the cloud.
Posted: 16 Jan 2011 | Published: 14 Jan 2011

MessageLabs Symantec Hosted Solutions

Cisco: Leading the Way to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cisco's borderless networks promises to connect anyone to anywhere, using any device, to any resource—securely, reliably, transparently. In order to fully deliver on this promise, Cisco is advancing along three critical fronts: workplace transformation, technology leadership, and operational excellence. Read this paper to learn more.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

Cisco Systems, Inc.

Stikeman Elliott LLP: IT Team Offers Legal Team More Functionality in their BlackBerry Smartphones
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how a busy, mobile legal team successfully developed a Blackberry application to easily look up contact lists, access internal information about their firm and have an emergency communications system in place.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

WLAN Access Control and Wi-Fi Network Needs
sponsored by TechTarget Security
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

TechTarget Security

Maximizing Smartphone Value: A Guide for IT Admins
sponsored by BlackBerry
WHITE PAPER: As an IT administrator what steps can you take to help your organization benefit the most from the mobile revolution? This guide offers practical, fresh ideas to help you lower costs, maximize benefits and map a strategy.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

BlackBerry

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research