RSS feed Get our RSS feed

News by Topic

byod

Results 226 - 250 of 499Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : cisco, byod, connectivity, education, networking environment
     Cisco
By: Extreme Networks     Published Date: Sep 17, 2014
Download this whitepaper to learn how your organization can plan for the move to 802.11ac wireless.
Tags : extreme networks, wifi, byod, 802.11ac wireless, wireless, wireless infrastructure, wireless network, networking technology
     Extreme Networks
By: Extreme Networks     Published Date: Sep 26, 2014
Les établissements hospitaliers sont aujourd’hui soumis à des pressions financières et techniques pour améliorer le traitement du patient et augmenter leur productivité. Un réseau filaire et Wi-Fi hautement sécurité et fiable est le minima requis pour supporter les données, la voix, la vidéo et les équipements et les applications métiers. Mais comment garantir continuité de service et connectivité Wi-Fi pervasive pour supporter ces éléments clés au meilleur coût ? Ce livre blanc vous guide grâce aux témoignages de professionnels de l’IT au sein de grands établissements hospitaliers. Ils y expliquent comment ils ont relevé le challenge de la mobilité en garantissant la sécurité de leurs patients.
Tags : extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview
     Extreme Networks
By: Extreme Networks     Published Date: Feb 05, 2015
A plan to upgrade a district’s infrastructure for increased capacity and security.
Tags : byod, infrastructure capacity, infrastructure security, network capacity, network security
     Extreme Networks
By: RES Software     Published Date: Apr 08, 2013
De ontwikkeling in IT heeft de afgelopen jaren niet stil gestaan. Alleen al het concept ‘Bring Your Own Device’ (BYOD), een gevolg van Het Nieuwe Werken, veroorzaakt een verandering in de manier waarop ICT-beheer vandaag de dag wordt uitgevoerd. De grens tussen werk en privé en de technologie die thuis of op het werk gebruikt wordt, vervaagt steeds meer nu werknemers persoonlijke apparaten als een tablet of mobiele telefoon, ook op de werkvloer gebruiken. Of andersom, wanneer de arbeidskracht de werklaptop thuis op de bank nog even voor een persoonlijk rondje surfen openklapt.
Tags : 
     RES Software
By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
This white paper explains how you can unleash the full potential of mobility - greater productivity, flexibility, and better economics - by unifying secure device access, user authentication, provisioning, and management.
Tags : byod, bring your own device, it infrastructure, mobile workforce, mobility
     HP OMG Mobile Workforce
By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
Download this paper and think beyond BYOD access by considering the critical need to have unified visibility, concurrent control of wired and wireless networks.
Tags : byod, bring your own device, wireless lan, wlan, mobile devices, mobile workforce, mobility
     HP OMG Mobile Workforce
By: Kaseya     Published Date: Mar 12, 2015
Cloud migrations will not be successful if organizations can’t deal with the “real” cloud rather than the one they see in TV commercials.
Tags : cloud management system, cloud computing, cloud architecture, byod, capital preservation, strategic initiatives, cloud migration
     Kaseya
By: NETIQ     Published Date: Jun 20, 2014
On the one hand, you have the increased productivity that goes along with BYOD. On the other hand, you have all the security risks and users’ concerns about giving IT visibility or control of a personal device. Learn how to solve this puzzle.
Tags : netiq, byod, mobile access, autonomy, privacy, security
     NETIQ
By: Comcast Business     Published Date: Mar 24, 2015
Trends such as big data and BYOD have made the network more critical than ever. Research shows the pain points IT departments are experiencing with network infrastructure - and the investments they're making to improve capacity, scalability, and flexibility. Download this white paper to learn more about network trends.
Tags : network, big data, byod, it department, network infrastructure, scalability, capacity
     Comcast Business
By: Windstream     Published Date: Mar 26, 2014
Whether you supply the devices or support a BYOD approach, Unified Communications (UC) makes it easier for your mobile workforce to stay connected.
Tags : windstream, byod, unified communications, mobile workers, telecommuters, connection, collaboration
     Windstream
By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : threattrack, security, threat, track, information, admins, best, practices
     ThreatTrack Security
By: XO Communications     Published Date: Jul 27, 2015
In this video, you’ll see how the hosted PBX solution enabled WestStar Mortgage to: • Reduce total cost of ownership (TCO) • Switch from variable capital expenses (CAPEX) to predictable monthly operating expenses (OPEX) • Reallocate IT staff to focus on WestStar’s core business • Increase productivity across loan offices with the XO WorkTime BYOD solution • Quickly add new office locations and fuel growth
Tags : xo hosted pbx, productivity, scalability, total cost of ownership, variable capital expenses, tco, capex, predictable monthly operating expenses
     XO Communications
By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
     AWS
By: ThousandEyes     Published Date: Aug 04, 2017
Technology trends like telecommuting, BYOD, VoIP and SaaS adoption bring new challenges to the underlying network infrastructure that connects branch offices and datacenters. This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : telecommuting, datacenter, network infrastructure, lan monitoring
     ThousandEyes
By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
     Frontier Communications
By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
     Kaspersky Lab
By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software
     Absolute Software
By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device
     Absolute Software
By: Sophos     Published Date: Dec 17, 2012
IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But convenience is always a trade-off with security.
Tags : byod, network security, mobile, security, buyer's guide, mdm, mobile device management
     Sophos
By: Sophos     Published Date: Jul 01, 2013
The BYOD paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYOD is here to stay, and tomorrow’s BYOD will involve even greater diversity in devices, form factors and platforms. Learn about where BYOD stands, where it’s headed, core challenges and how to build a BYOD action plan.
Tags : mobile, byod
     Sophos
By: Sophos     Published Date: Jul 01, 2013
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models. This whitepaper explains the risks and rewards of BYOD, and shows you how you can adopt BYOD in your workplace while protecting your data.
Tags : risk, rewards, byod, security
     Sophos
By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
     Lumension
By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : sap, mobile, managing, business, mobility, technology
     SAP
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics