RSS feed Get our RSS feed

News by Topic

byod

Results 376 - 400 of 493Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 09, 2015
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
     IBM
By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
     IBM
By: IBM     Published Date: Jan 09, 2015
Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? You’ll better understand the value that firms are deriving from UC, the status of its adoption, and the barriers to full implementation.
Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
     IBM
By: Vidyo     Published Date: Nov 12, 2013
Read how Vidyo is a leader and innovator in bringing software-based architecture that is needed to deliver the scale to support hundreds of thousands of personal endpoints.
Tags : vidyo, web conferencing, video conferencing, mobile workers, byod, company meeting, international employees
     Vidyo
By: Cisco     Published Date: Jul 15, 2013
From cloud-based voice and video to comprehensive BYOD and mobility support to deployment costs, this report highlights six key areas to evaluate in collaboration offerings.
Tags : cisco mobility, cisco, collaboration, enterprise collaboration, mobile enterprise, mobile workers, collaboration, byod platforms
     Cisco
By: Sophos     Published Date: Jul 15, 2013
This MDM buyers guide will walk you through the process of selecting the right mobile device management solution that fits your company’s BYOD objectives. It explains how an effective MDM system can support an organization's workforce mobility strategy, ensure compliance, and provide central management of devices and apps while supporting easy administration.
Tags : sophos, byod, buyers guide, mobile device management, mobile device, android, windows 8, mobile
     Sophos
By: Cisco     Published Date: Nov 18, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : cisco, design summary, byod, network
     Cisco
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.
Tags : citrix, byod, strategy, mobile, mdm, mobile app management, emm, mobility
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : citrix, enterprise, mobility, management, byod
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM).
Tags : citrix, byodm cyod, cope, security
     Citrix Systems, Inc.
By: Rapid7     Published Date: Jan 10, 2013
In a January 2012 market research study, 71 percent of the businesses surveyed said that mobile devices have caused an increase in security incidents.
Tags : security, network security, cloud, mobile, cloud, byod
     Rapid7
By: Citrix     Published Date: Dec 09, 2013
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery
     Citrix
By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
     Citrix
By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : mobile, enterprise, application gap, pcs, byod, data
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.
Tags : blackberry, byod, citrix xenmobile, control, security
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : mobility, management, boyd, secure app, data delivery
     Citrix
By: Citrix     Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : enterprise mobile, executive checklist, security, byod
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Discover how to select technologies and develop policies for your BYOD program.
Tags : boyd, simple, secure, technologies
     Citrix
By: Logicalis     Published Date: Aug 29, 2014
Learn how healthcare providers can keep pace with the changing healthcare IT landscape.
Tags : logicalis, healthcare, healthcare it, hit, storage, patient engagement, mobility, byod
     Logicalis
By: Logicalis     Published Date: Aug 29, 2014
Download this whitepaper to learn 4 way your healthcare organization can benefit from a healthcare access solution.
Tags : logicalis, healthcare access solution, healthcare it, hit, virtual desktop infrastructure, single sign on, byod, managed services
     Logicalis
By: Cisco     Published Date: Jan 05, 2015
Midmarket enterprises strive for success in a highly competitive landscape. Being a successful leader means encouraging employees to collaborate and work more efficiently to increase the success of the enterprise. Technology solutions can empower employees for success at work, home, and when mobile, but technology must also be able to support changes that occur in a business without increasing the risks associated with providing excellent customer service, fostering innovation, and engaging with an enterprise’s stakeholders.
Tags : cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private
     Cisco
By: Cisco     Published Date: Jan 06, 2015
The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments.
Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, security
     Cisco
By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
     Kaspersky
By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics