RSS feed Get our RSS feed

News by Topic

byod

Results 326 - 350 of 499Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : discover, classify, endpoints, miercom, byod, iot
     ForeScout
By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
     ForeScout
By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : ibm, security, risk, byod, safeguard, protection, threat protection, it security
     IBM
By: IBM MaaS360     Published Date: Apr 15, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : mobile device security, byod, application security, data security
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Get the latest mobile devices and apps in the handsof learners and educators quickly and securely with mobile device and app management.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : byod, mobile devices, smartphone, tablet
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : ibm, bring your own device, byod, mobile, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at IT’s challenges in managing Bring Your Own Device (BYOD) for today’s organizations
Tags : ibm, mobile, mobile device management, mdm, security
     IBM MaaS360
By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : ibm security, access management solutions, mobile channel security, advanced threats, byod, security
     IBM
By: IBM     Published Date: Apr 09, 2015
IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.
Tags : ibm, security, risk management, mobile device security
     IBM
By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
     IBM
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, mobile, mobile security, devices, platform to device
     IBM
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy
     IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics