RSS feed Get our RSS feed

News by Topic

byod

Results 401 - 425 of 493Sort Results By: Published Date | Title | Company Name
By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Smarsh     Published Date: Feb 27, 2014
More organizations are deploying and migrating their information archiving to the cloud. In this report, The Radicati Group provides an overall market evaluation of 10 leading Cloud archiving providers, tips for selecting an information archiving solution and the opportunities and challenges that compliance, IT and legal professionals experience when choosing an information archiving platform.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: EarthLink Business     Published Date: May 15, 2014
This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.
Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
     EarthLink Business
By: Riverbed     Published Date: Jul 15, 2014
Virtual desktop infrastructure (VDI) offers organizations the means to centrally manage and deliver desktops as a service to reduce costs, increase data security, and streamline desktop management while enabling anytime, anywhere access across a wide variety of devices. IT consumerization trends such as BYOD (bring your own device) and device diversity are accelerating VDI adoption, which is expected to double over the next year.
Tags : troubleshooting, virtual desktop, infrastructure, vdi, deployments, manage it, byod
     Riverbed
By: Riverbed     Published Date: Jul 18, 2014
Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!
Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration
     Riverbed
By: HP     Published Date: Aug 26, 2014
SMBs need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT program for SMBs, HP Networking solutions are purpose-built for growing businesses. Learn what to look for in networking technology, and how HP can help you create a network that will keep pace with your business growth.
Tags : data, business, technology, portfolio, cloud-based, support, portal, solution
     HP
By: HP     Published Date: Aug 26, 2014
More and more enterprises are adopting “bring your own device” (BYOD) initiatives to let employees choose the device they use. The HP BYOD solution, based on the HP Intelligent Management Center (IMC), offers a single-pane-of-glass network and user management solution for your entire network. With an HP BYOD solution, you can efficiently manage your entire infrastructure, secure personally owned devices, and monitor BYOD traffic. HP IMC also goes beyond the unified BYOD essentials by delivering converged management across various networks—physical and virtual, wired and wireless, and Software-Defined Networking (SDN). Discover how.
Tags : byod, holistic, data, business, technology, portfolio, cloud-based, support
     HP
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : iboss, remote access, byod, cybersecurity, mobile workforce
     iboss
By: IBM     Published Date: Feb 27, 2014
Learn the best practices that the mobile technology leaders are using and see how your organization could benefit from an infrastructure that supports mobile devices and other mobile solutions.
Tags : mobile, best practices, mobile technology, mobile solutions, mobile devices, mobile collaboration, byod, bring your own device
     IBM
By: IBM     Published Date: Feb 27, 2014
Learn about the necessary security precautions that must be enabled so your employees can use mobile devices in a world where mobility is key.
Tags : security essentials, cio, mobility, security precautions, ibm, bring your own device, byod
     IBM
By: CompareBusinessProducts     Published Date: Feb 27, 2015
Read on to discover revealing points on the climate of phone systems in 2015
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
     CompareBusinessProducts
By: CompareBusinessProducts     Published Date: Feb 27, 2015
The business phone system search can be a complex one… but there are some must-have features that will help you narrow down your search. Our new infographic details the features that really matter for most businesses.
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
     CompareBusinessProducts
By: CompareBusinessProducts     Published Date: Feb 27, 2015
Everything You Need to Consider Before Deployment
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
     CompareBusinessProducts
By: CompareBusinessProducts     Published Date: Feb 27, 2015
One sign that your phone system is getting obsolete is when your spare parts are available on order only, and it takes a week for the items to arrive. Our infographic unveils the other symptoms!
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
     CompareBusinessProducts
By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : byod, network security, mobile, security, policy, apple, end user, device
     Absolute Software
By: Absolute Software     Published Date: Jan 10, 2013
Mobile diversity and employee demand drive growth in Byod programs
Tags : 
     Absolute Software
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
     HP - Enterprise
By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : byod, okta, mobility, safety, dad, mobility management
     Okta
By: IBM     Published Date: Jan 23, 2013
In our hyperconnected world, employees expect to work from anywhere … at any time … with any device. Each of these new access points, however, increases the IT security perimeter.
Tags : byod, mobile, remote access, productivity
     IBM
By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : reputational risk, business continuity, risk management, cloud, social media, mobile, byod
     IBM
By: HP and Intel® Xeon® processors     Published Date: Aug 23, 2012
As more and more enterprises like yours begin to see significant benefits from allowing employees to choose the device they use to get the jobs done.
Tags : byod, enterprises, cio, hp imc
     HP and Intel® Xeon® processors
By: SAP     Published Date: Jul 18, 2012
An increasing number of organizations are permitting employees to bring their own mobile devices into the workplace to be used for work purposes. While this practice may first appear to reduce enterprise mobility costs while increasing employee productivity, it also poses new risks and may actually increase costs if not properly managed. Know how to cost-effectively manage this Bring-Your-Own-Device (BYOD) phenomenon.
Tags : technology, mobile, byod, bring-your-own-device, mobile devices
     SAP
By: BlackBerry     Published Date: Oct 03, 2012
Find out what key elements to consider in your Enterprise Mobility Strategy. And learn how BlackBerry Mobile Fusion can improve mobile security, reduce TCO and improve productivity.
Tags : mobile device management, mobile security, bring your own device, byod, enterprise mobility strategy
     BlackBerry
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics