RSS feed Get our RSS feed

News by Topic

byod

Results 301 - 325 of 493Sort Results By: Published Date | Title | Company Name
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : fiberlink, deliverability, mobile users, strategy, app enabled, scalability, security, device management
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
The Aragon Globe delivers an eighteen-vendor comparison on EMM strengths and weaknesses for mobile devices, content and BYOD readiness.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : byod, mobile devices, smartphone, tablet
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : ibm, bring your own device, byod, mobile, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at IT’s challenges in managing Bring Your Own Device (BYOD) for today’s organizations
Tags : ibm, mobile, mobile device management, mdm, security
     IBM MaaS360
By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : iboss, remote access, byod, cybersecurity, mobile workforce
     iboss
By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Kaseya     Published Date: Jul 24, 2013
BYOD, cloud computing, MAC adoption and social networking security will dominate IT organizations this year.
Tags : kaseya, byod, cloud computing, mac adoption, social networking, data, it solutions, it concepts
     Kaseya
By: Kaseya     Published Date: Oct 03, 2013
Eight Keys to Cloud Friendly System Management
Tags : kaseya, cloud, cloud computing, system management, cloud migrations, lan, public cloud, private cloud
     Kaseya
By: Kaseya     Published Date: Nov 18, 2013
The BYOD trend is now mainstream and growing rapidly in acceptance. Gartner now estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.
Tags : kaseya, byod, technology trends byod, mobile, mobility, mdm, mobile device managment
     Kaseya
By: Kaseya     Published Date: Mar 12, 2015
Cloud migrations will not be successful if organizations can’t deal with the “real” cloud rather than the one they see in TV commercials.
Tags : cloud management system, cloud computing, cloud architecture, byod, capital preservation, strategic initiatives, cloud migration
     Kaseya
By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
     Kaspersky
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics