RSS feed Get our RSS feed

News by Topic

byod

Results 276 - 300 of 493Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: May 18, 2016
A Google Trends search for “BYOD” reveals it is a fairly new term, appearing in news publications for the first time in late 2011. BYOD is one part of a much larger, deeper-rooted trend: The consumerization of IT, which can be traced back to the early 2000s. Around that time, most everyone had a personal computer, which enabled them to work from home after hours – and to realize the benefits of using the devices that they had carefully chosen and were comfortable using, rather than the corporate devices their IT departments had issued them. BYOD and the consumerization of IT continued to grow as devices became cheaper and more connected. Where IT leaders were once solely concerned with reining in all the unapproved devices accessing the corporate network, a recent Intel and readwrite report that shows 49 percent of U.S. IT managers “strongly agree that BYOD improves worker productivity.” The next era of BYOD has arrived, and IT departments are thinking about it as a strategic value-ad
Tags : productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
     VMware AirWatch
By: VMware AirWatch     Published Date: May 19, 2016
This eBook outlines the five best practices business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : ebook, best practices, mobile
     VMware AirWatch
By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing
     Aerohive
By: Aerohive     Published Date: Jul 03, 2012
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. This white paper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : byod, mobility, productivity
     Aerohive
By: Aerohive     Published Date: Oct 01, 2012
Best Practices to prepare your WLAN for BYOD and the Consumerization of IT
Tags : aerohive, free, webinar, cio, byod, wlan, consumerization
     Aerohive
By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) transforms the workplace, making it more productive, efficient and effective. Hosted UC service providers remotely deliver and manage various communications services using shared resources enabling customers to consolidate and outsource much, or possibly all, of their communications and collaborations needs for a fixed monthly cost. This whitepaper details the top reasons to consider a hosted unified communication solution for your enterprise.
Tags : unified communication, unified collaboration, enterprise unified communication, hosted unified communication, hosted uc, hosted ucaas, uc total cost of ownership, uc tco
     Arkadin
By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) is a set of communications and collaboration products that provide end users with a single interface and experience across multiple device and media types. UC allows employees to collaborate more efficiently while lowering the overall cost of communications. This whitepaper reveals market trends, how to evaluate one solution vs. another, and the range of deployment options all critical to selecting the right UC solution for your organization
Tags : unified communication, unified collaboration, enterprise unified communication, deploying uc, byod, arkadin, microsoft lync, collaboration solutions
     Arkadin
By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : cisco, security, next-gen threat defense, byod, saas, firewalls, next-generation firewalls
     Cisco
By: Cisco     Published Date: Jan 16, 2014
Comprehensive network visibility and control increases business efficiency and enables business growth while maximizing security.
Tags : cisco, next-generation firewall, byod, bring your own devise, security
     Cisco
By: Cisco     Published Date: Jan 16, 2014
This document is a Cisco Validated Design (CVD) for Cisco Bring Your Own Device (BYOD) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for deploying personal, corporate, and guest devices onto a network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a BYOD solution, this CVD will continue to evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution.
Tags : cisco, byod, wireless, bring your own device, cisco validated design, cvd
     Cisco
By: Cisco     Published Date: Jan 16, 2014
Latest IT Trends For Secure Mobile Collaboration
Tags : cisco, byod, bring your own device, mobile, mobile collaboration, it trends
     Cisco
By: Cisco     Published Date: Jan 16, 2014
A Model of BYOD’s Benefits to Global Companies
Tags : cisco, byod, global companies, cisco ibsg, bring your own device.
     Cisco
By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : globalscape, mobile, business, byod, security
     Globalscape
By: Aerohive Networks     Published Date: May 27, 2014
Learn about two approaches for efficient WLAN design and see how you can seamlessly integrate 802.11ac into your WLAN in order to lay the foundation for the future of high-speed technologies.
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod
     Aerohive Networks
By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod
     Aerohive Networks
By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod
     Aerohive Networks
By: Dropbox for Business     Published Date: May 07, 2015
It's all about Usability. Help educate your prospects about the shifting role of IT and share best practices for evaluating technology in a BYOD world.
Tags : usability, employee performance, consumerization, application adoption, best practices, byod, data management, ofs
     Dropbox for Business
By: TIBCO     Published Date: Aug 18, 2014
Today, the open API is one of the most powerful sources of competitive advantage. It comes down to the potential of your data and services. Download this new eBook to learn how a well thought-out API strategy can help you compete and grow in new ways.
Tags : tibco, api, byod, end user intelligence, business intelligence, byod, mobile device users, business strategy
     TIBCO
By: IBM MaaS360     Published Date: Sep 30, 2014
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock? The good news is IT can embrace BYOD with security and confidence given the right preparation and technology??
Tags : byod, device discovery, self-service portals, end users
     IBM MaaS360
By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod
     IBM MaaS360
By: Cloud Sherpas     Published Date: Aug 13, 2015
In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure
Tags : google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development
     Cloud Sherpas
By: VMware AirWatch     Published Date: Dec 09, 2016
Thanks to the rising importance of business mobility, the BYOD trend, and improvements in the underlying technology, the adoption rate of desktop virtualization is faster today than ever before. But as enterprises move to virtualization as a foundation for end-user computing strategies, more agile, high-performing infrastructures are needed. Download this white paper to learn why software-defined data centers (SDDC) are an attractive infrastructure option for virtualization. Inside, you’ll gain access to different articles featuring: Why infrastructure matters in desktop and application virtualization Building the future of the desktop on the software-defined data center SDDC-powered virtual desktop and application benefits And more
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
     VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics