RSS feed Get our RSS feed

News by Topic

byod

Results 151 - 175 of 493Sort Results By: Published Date | Title | Company Name
By: TigerText     Published Date: Aug 30, 2015
Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.
Tags : tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management
     TigerText
By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : byod, virtualization, enterprise applications, mobile, security, implementation
     Good Technology Corporation
By: VMware AirWatch     Published Date: Sep 16, 2015
In this eBook you’ll read case studies about top enterprises that have safely enabled BYOD and self-service capabilities with an EMM platform, providing IT with an opportunity to enable process transformations and drive new revenue streams.
Tags : byod, emm, mobility, airwatch
     VMware AirWatch
By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : security, compliance, mobile, tablets, byod, cloud
     HP - Enterprise
By: Extreme Networks     Published Date: Feb 14, 2017
Los dispositivos móviles han irrumpido en los campus y centros educativos. Esto abre la posibilidad a todo un mundo de nuevas formas de aprendizaje, pero también plantea numerosos retos para la red y sus gestores. Este documento ofrece una valiosa orientacion para abordar con éxito estos desafíos.
Tags : 
     Extreme Networks
By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : byod, strategy, endpoint, management, uem, business, applications, data
     MobileIron
By: Kaseya     Published Date: Oct 03, 2013
Eight Keys to Cloud Friendly System Management
Tags : kaseya, cloud, cloud computing, system management, cloud migrations, lan, public cloud, private cloud
     Kaseya
By: Kaseya     Published Date: Mar 12, 2015
Cloud migrations will not be successful if organizations can’t deal with the “real” cloud rather than the one they see in TV commercials.
Tags : cloud management system, cloud computing, cloud architecture, byod, capital preservation, strategic initiatives, cloud migration
     Kaseya
By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : mobile, enterprise, application gap, pcs, byod, data
     Citrix
By: Adobe     Published Date: Jul 04, 2016
In this white paper, we uncover the numerous document productivity features that employees want across PCs and mobile devices.
Tags : mobile device management, byod
     Adobe
By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : mobile computing, the increase in mobile workers, byod policy implications for it
     Aerohive
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
     BAE Systems
By: IBM MaaS360     Published Date: Apr 16, 2015
The Aragon Globe delivers an eighteen-vendor comparison on EMM strengths and weaknesses for mobile devices, content and BYOD readiness.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : fiberlink, deliverability, mobile users, strategy, app enabled, scalability, security, device management
     IBM MaaS360
By: Citrix Systems     Published Date: Sep 06, 2013
Empowering Information Security with Desktop Virtualization
Tags : citrix, security, desktop virtualization, strengthen information, reduce risk, byod
     Citrix Systems
By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : cisco, byod, connectivity, education, networking environment
     Cisco
By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : byod, device, security, enterprise, mobility, policy
     Absolute Software
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, security
     CDW-Trend Micro
By: Workforce Software     Published Date: Jun 04, 2015
This paper helps outline some of the ways to control BYOD risks and outlines other factors that influence your decision to establish a BYOD policy. Like Cloud-based software delivery, BYOD presents such compelling advantages over the traditional approach that its emergence as the dominant mobile strategy appears to be a question of “when” rather than “if.”
Tags : workforce software, byod, enterprise applications, mobile strategy, mobile devices
     Workforce Software
By: Kaseya     Published Date: Nov 18, 2013
The BYOD trend is now mainstream and growing rapidly in acceptance. Gartner now estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.
Tags : kaseya, byod, technology trends byod, mobile, mobility, mdm, mobile device managment
     Kaseya
By: Citrix     Published Date: Jul 25, 2014
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : mobility, management, boyd, secure app, data delivery
     Citrix
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : citrix, enterprise, mobility, management, byod
     Citrix Systems, Inc.
By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility
     Enterprise Mobile
By: CA Technologies     Published Date: Aug 24, 2017
The existence of smartphones and tablets able to run lightweight apps has created a quantum leap in the potential of mobile devices in the workplace. Apps present enterprises with clear benefits in terms of maximizing employee connectivity, availability, flexibility and productivity.
Tags : 
     CA Technologies
By: ThousandEyes     Published Date: Aug 04, 2017
Technology trends like telecommuting, BYOD, VoIP and SaaS adoption bring new challenges to the underlying network infrastructure that connects branch offices and datacenters. This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : telecommuting, datacenter, network infrastructure, lan monitoring
     ThousandEyes
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics