RSS feed Get our RSS feed

News by Topic

byod

Results 426 - 450 of 493Sort Results By: Published Date | Title | Company Name
By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, learn how to establish harmony between security and usability with the BlackBerry PlayBook OS 2.0. Get the answers to your most pressing questions and make BYOD a success for your enterprise.
Tags : mobile device management, mobile device, mobile communications, managing mobility, mobile management, mobile security, mobile usability
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
Get the details on how BlackBerry Mobile Fusion can make managing mobile devices - including those running Apple iOS and Google Android operating systems faster, easier and safer than ever.
Tags : byod, bring your own device, blackberry, mobile device, managing mobility, managing enterprise mobility, smartphones, mobile device management
     BlackBerry
By: HP-Intel®     Published Date: Nov 19, 2012
An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the workplace.
Tags : intel, byod, healthcare
     HP-Intel®
By: Blackberry     Published Date: Oct 03, 2012
Find out what key elements to consider in your Enterprise Mobility Strategy. And learn how BlackBerry Mobile Fusion can improve mobile security, reduce TCO and improve productivity.
Tags : mobile device management, mobile security, bring your own device, byod, enterprise mobility strategy
     Blackberry
By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : byod, bring your own device, mobile device, education applications, education, security risk, security compliance, security
     HP - Intel®
By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : byod, healthcare, bring your own device, mobile devices, security risk, security compliance, security
     HP - Intel®
By: Brainshark     Published Date: Oct 21, 2013
Mobile, video and social media are growing rapidly - but not independently. This video takes a look at the relationships between each trend, and how your business can capitalize on all three to advance your communications strategy.
Tags : business communications, training, b2b, b2c, customer engagement, marketing, mobility, mobile
     Brainshark
By: CDW     Published Date: Nov 12, 2012
Cedar Falls Schools create an infrastructure to support classroom technology programs ahead.
Tags : cdw, case study, cedar falls, byod, bring your own device, bandwidth
     CDW
By: CDW     Published Date: Nov 12, 2012
Johnson County Community College overhauls network infrastructure to support students' personal devices.
Tags : cdw, byod, network infrastructure, explosion of byod, personal devices
     CDW
By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : cdw, consumerization of technology, mobile computing devices, influx of byod
     CDW
By: CDW     Published Date: Oct 10, 2013
The Georgia Dome deployed a Wi-Fi network that lets fans browse the web on smartphones, view replays and communicate via social media.
Tags : georgia dome, dome stadium, wireless crowd, wireless users, wifi support, update to wifi, wireless connectivity, peak usage
     CDW
By: CDW     Published Date: Jun 30, 2015
Apps have made mobile devices standard equipment for today’s workforce. And with the right strategy for selecting and customizing them, apps can change the way you work.
Tags : mobility, mobile workers, byod, productivity
     CDW
By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device
     Sponsored by HP and Intel®
By: Kaseya     Published Date: Jul 24, 2013
BYOD, cloud computing, MAC adoption and social networking security will dominate IT organizations this year.
Tags : kaseya, byod, cloud computing, mac adoption, social networking, data, it solutions, it concepts
     Kaseya
By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NETIQ
By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : authentication, byod, mobile workforce, it security, key management
     SafeNet
By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : mobile, virtualization, mobile workforce, remote employees
     HP and Intel ®
By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations
     Cisco
By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management
     Cisco
By: Cisco     Published Date: Aug 27, 2015
Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best
Tags : cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans
     Cisco
By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application
     Cisco
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : data security, byod, corporate security, mobile data security, user experience, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Feb 05, 2015
Before you take that fatal next step in allowing mobility, security, BYOD and user flexibility, carefully read these top 10 reasons why you don't need mobile device management.
Tags : 
     IBM MaaS360
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics