Skip to main content
Main Menu
  • Finding MeMo (Memorable Mobile applications)

    "Mobile application stores - should they be controlled by handset manufacturers?" This question was circulated among members of the Mobile Data Association (MDA) group on linkedin last month, and it was clear from the responses and other recent announcements from across the industry, that this is a key battleground for the many different players in the mobile ecosystem. As well as the handset vendors such as Palm, BlackBerry or Nokia and software platform vendors like Microsoft, these also include mobile operators who have devices tailored or tuned to their specifications and networks, and a number of independent portals who offer applications across all networks and devices.

    View this Article
  • Security on the move

    With data breaches a seemingly everyday occurrence, more could be done to protect data from loss. This article discusses the role that encryption plays in protecting data stored on mobile and portable devices.

    View this Article
  • Should encryption be optional?

    The use of encryption can be considered best practice for protecting data on the move from loss or theft, but now it is no longer optional for many.

    View this Article
  • The informed traveller

    A recent event co-hosted by the Mobile Data Association and the Location and Timing Knowledge Transfer Network, looked at new and emerging location based technologies and applications that have the potential to change the way people and professionals plan their journeys and travel.

    View this Article
  • The state of play at CA

    Software vendor CA recently played host to the Industry Analyst community with a mid year update. Some bright indicators are to found in the company's position, while a few product challenges remain to be addressed.

    View this Article
  • How to secure your on-the-go data

    The use of encryption is key, but identity management and DLP have their parts to play.

    View this Article
  • Content security for the next decade

    The need to share information has never been greater as cross-organisational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organisations, carries more and more risk as regulations are tightened around data protection and personal privacy. Those businesses that stay ahead of their competition in the next decade will be those that put the technology in place to allow them to share content widely, but safely.

    View this Report
  • Content security for the next decade

    The need to share information has never been greater as cross-organisational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organisations, carries more and more risk as regulations are tightened around data protection and personal privacy. Those businesses that stay ahead of their competition in the next decade will be those that put the technology in place to allow them to share content widely, but safely.

    View this Report
  • Content security for the next decade

    The need to share information has never been greater as cross-organisational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organisations, carries more and more risk as regulations are tightened around data protection and personal privacy. Those businesses that stay ahead of their competition in the next decade will be those that put the technology in place to allow them to share content widely, but safely.

    View this Report
  • Content security for the next decade

    The need to share information has never been greater as cross-organisational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organisations, carries more and more risk as regulations are tightened around data protection and personal privacy. Those businesses that stay ahead of their competition in the next decade will be those that put the technology in place to allow them to share content widely, but safely.

    View this Report

Pages