RSS feed Get our RSS feed

News by Topic

byod

Results 301 - 325 of 493Sort Results By: Published Date | Title | Company Name
By: Extreme Networks     Published Date: Feb 12, 2015
Die rasend schnelle Entwicklung der Technologie beeinflusste auch die Arbeit der Mitarbeiter des Bayerischen Landtags. Mit der Modernisierung der IT-Infrastruktur unterstützt dieser nun neueste Technologien und bietet eine leistungsfähige und zukunftsorientierte Arbeitsumgebung
Tags : byod, wlan, security, nac, netzwerkmanagement
     Extreme Networks
By: Cisco     Published Date: Jun 10, 2015
Read Pay Attention IT: A New Convergence Is Afoot to learn about the necessary steps you need to take now for your organization to best benefit from the Internet of Everything.
Tags : cisco, catalyst, networks, byod, mobile computing, wifi, iot, convergence
     Cisco
By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NETIQ
By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : cisco, byod, connectivity, education, networking environment, digital revolution, higher education, security
     Cisco
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management
     Dell SonicWALL
By: VMware AirWatch     Published Date: Nov 13, 2015
Prácticas recomendadas para implementar un programa BYOD productivo En los últimos años, «BYOD», que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los términos más utilizados en la empresa, al generalizarse el uso de los dispositivos móviles en muchas organizaciones. Sin embargo, además de ser un término que está de moda, su significado no es el de unas simples siglas. BYOD forma parte de una tendencia más amplia y arraigada: la consumerización de las TI, que se remonta al principio de la década de 2000. Por aquel entonces, casi todos disponían de un ordenador personal, con lo que podían trabajar desde casa fuera del horario laboral, así como disfrutar de las ventajas de utilizar los dispositivos de su elección y con los que se sentían más cómodos en lugar de usar los dispositivos corporativos que les proporcionaban los departamentos de TI.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
En los últimos años, «BYOD», que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los términos más utilizados en la empresa, al generalizarse el uso de los dispositivos móviles en muchas organizaciones. Sin embargo, además de ser un término que está de moda, su significado no es el de unas simples siglas.
Tags : byod, mobility, analysis, enablement
     VMware AirWatch
By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : business models, development, business solutions
     Cisco
By: Polycom     Published Date: Sep 15, 2015
Complete voice and video solutions that extend Microsoft unified communications and empower user collaborative experiences
Tags : byod, collaboration, conferencing, lync, microsoft, phone, polycom, skype
     Polycom
By: VMware AirWatch     Published Date: May 24, 2016
Mobilität bietet das Potenzial größerer Wettbewerbsvorteile und damit erstklassige strategische Chancen für Unternehmen jeder Art, sei es durch Möglichkeiten für produktiveres Arbeiten für die Mitarbeiter oder durch innovative Methoden der Kommunikation mit den Kunden. Um dieses Potenzial auszuschöpfen, werden mobile Systeme im Unternehmen benötigt, die von den Benutzern nahtlos auf mehreren Geräten genutzt werden können und einen sicheren Arbeitsbereich für geschäftskritische Anwendungen bieten. Um den Anforderungen des mobilen Personals und Kundenstamms zu genügen, müssen Unternehmen BYOD- und Selbstbedienungsfunktionen sicher auf einer etablierten Plattform bereitstellen, die zudem skalierbar ist, um neue Prozesse zu unterstützen.
Tags : productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
¿Gestión de dispositivos móviles (MDM), contenedorización o ambas? Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM). En un acto con analistas celebrado en 2013, un comité de analistas dijo a los asistentes que el fenómeno de uso de dispositivos personales (BYOD) desembocaría en una reducción de los precios, una caída en picado de las ventas y la desaparición de un sector. «En estos momentos, la gestión de dispositivos móviles es un caos y creo que ese mercado va a desaparecer», declaró John Girard ante los asistentes (según CRN.com). Girard predijo una transición hacia la gestión a nivel de aplicación forzada por la tendencia BYOD y la reticencia de los empleados a la gestión de dispositivos personales.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM). En un acto con analistas celebrado en 2013, un comité de analistas dijo a los asistentes que el fenómeno de uso de dispositivos personales (BYOD) desembocaría en una reducción de los precios, una caída en picado de las ventas y la desaparición de un sector. «En estos momentos, la gestión de dispositivos móviles es un caos y creo que ese mercado va a desaparecer», declaró John Girard ante los asistentes (según CRN.com). Girard predijo una transición hacia la gestión a nivel de aplicación forzada por la tendencia BYOD y la reticencia de los empleados a la gestión de dispositivos personales.
Tags : best practices, business optimization, enterprise management, business intelligence
     VMware AirWatch
By: Enterprise Mobile     Published Date: Sep 30, 2013
: Interested in knowing what CIOs and other IT executives really think about the future of enterprise mobility? Enterprise Mobile uncovers the results of a survey conducted to assess the business impact of enterprise mobility based on input from technology leaders. The webinar provides tips to prepare for the future of enterprise mobility, secrets to removing barriers to mobile strategy implementation, and shares trends around how other companies are embracing mobile security.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
     Enterprise Mobile
By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : data breaches, data privacy, hipaa, finra, byod, pii, phi
     Druva
By: IBM     Published Date: Jan 09, 2015
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
     IBM
By: CA Technologies EMEA     Published Date: Oct 19, 2017
Comme ces chiffres le montrent, tout tourne autour des applications. Les entreprises souhaitent plus que tout se différencier de la concurrence en offrant aux consommateurs des expériences mobiles riches et des services mettant l’accent sur le côté pratique ; quant aux employeurs, ils n’attendent que de pouvoir tirer parti des gains de productivité offerts par les initiatives mobiles améliorées de type BYOD.
Tags : 
     CA Technologies EMEA
By: VMware AirWatch     Published Date: Nov 13, 2015
Au cours des dernières années, le terme « BYOD » ( Bring Your Own Device » ou « Utilisation de terminaux personnels ») a gagné en popularité dans le monde du travail, et les terminaux mobiles sont devenus très courants dans de nombreuses entreprises. Toutefois, ce terme englobe bien plus que cette nouvelle tendance. L’utilisation de terminaux personnels n’est qu’une partie d’une évolution plus importante et plus profonde : celle de la consumérisation de l’informatique qui remonte au début des années 2000. À cette époque, presque tout le monde avait un ordinateur personnel qui permettait de travailler chez soi en dehors des heures de travail. Nous avions tous les avantages de ces terminaux choisis avec soin et nous profitions d’un grand confort d’utilisation par rapport aux terminaux d’entreprise préparés par le service informatique.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
Nous avions tous les avantages de ces terminaux choisis avec soin et nous profitions d’un grand confort d’utilisation par rapport aux terminaux d’entreprise préparés par le département informatique.
Tags : byod, mobility, analysis, enablement
     VMware AirWatch
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The school has a reputation for innovation and makes extensive use of technology to educate its students and to prepare them for the technologies which help shape the world of both work and higher education.
Tags : technology innovation, technology, technology for education, byod, education
     Kaspersky Lab Australia and New Zealand
By: apperian     Published Date: Apr 13, 2012
Uncover the benefits of BYOD and learn how the proper technology combined with effective policies can enable employees to increase productivity while protecting your company assets at the same time.
Tags : apperian, mobile device, technology, it management, technology device, business technology
     apperian
By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
     IBM
By: Sophos     Published Date: Oct 07, 2015
This paper looks at BYOD security challenges posed by employees working beyond the company's secure perimeter, exposes the main BYOD security risks and proposes transitioning to a cloud-based security service.
Tags : security, byod security, bring your own device security, byod security challenges
     Sophos
By: Good Technology Corporation     Published Date: Apr 29, 2013
Companies today can’t just “bolt on” mobile capabilities. To succeed, you have to put mobile first. Read—Moving Beyond BYOD to Mobile First: A 3-Step Approach for CIOs—to learn how a making mobile a core part of your IT strategy increases revenue.
Tags : mobile collaboration, byod management, byod solutions, byod strategy, enterprise collaboration, enterprise mobility, mobile device management
     Good Technology Corporation
By: IBM     Published Date: Feb 27, 2014
Learn the best practices that the mobile technology leaders are using and see how your organization could benefit from an infrastructure that supports mobile devices and other mobile solutions.
Tags : mobile, best practices, mobile technology, mobile solutions, mobile devices, mobile collaboration, byod, bring your own device
     IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics