RSS feed Get our RSS feed

News by Topic

mobile security

Results 1 - 25 of 768Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Dec 16, 2009
In this webinar, Jack Heine, Research VP, Gartner, and David Holyoak, CIO of accounting firm Grant Thornton, discuss how to facilitate mobility while minimizing the risk of data exposure using web-based management and anti-theft capabilities.
Tags : absolute, it security, mobile management, project management, mobility, mobile security, remote management
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : byod, policy, guide, mobile, security, cloud, apps, administration
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : byod, network security, mobile, security, policy, apple, end user, device
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : mobility, competitive advantage, best practices, mobile devices, mobile applications
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : mobility, mobile computing, best practices, data security
     Absolute Software
By: Acronis EMEA     Published Date: May 18, 2015
Download this datasheet to discover the main benefits of Acronis Access Advanced.
Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
     Acronis EMEA
By: Acronis EMEA     Published Date: May 19, 2015
Download this paper to uncover the steps needed to mobilise your workforce and become more productive.
Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
     Acronis EMEA
By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
     Acronis EMEA
By: Acronis EMEA     Published Date: May 19, 2015
This case study explores how Acronis Access changed the way Parrish Construction Group communicates.
Tags : build a mobile workforce, control access, share documents, security, acronis access solution, acronis, access to documents, mobility
     Acronis EMEA
By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences, customer experience/engagement
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences, customer experience/engagement
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences, customer experience/engagement
     Adobe
By: Adobe     Published Date: Feb 10, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
     Adobe
By: Adobe     Published Date: Apr 22, 2016
This white paper uncovers the numerous document productivity features that employees want across PCs and mobile devices.
Tags : mobility, mobile devices, cloud, cloud-based, cloud-based productivity apps, enterprise, enterprise productivity, productivity apps
     Adobe
By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : data security, data management, mobile security, mobile marketing
     Adobe
By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : enterprise mobility, mobile application security, it management
     Adobe
By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : data security, data management, mobile security, mobile marketing
     Adobe
By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : enterprise mobility, mobile application security, it management
     Adobe
By: Adobe     Published Date: Aug 11, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, website development
     Adobe
By: Adobe     Published Date: Aug 11, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, internet marketing
     Adobe
By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, document security, data security, mobile device, enterprise, mobile, security, saas
     Adobe
By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : ibm, document management, data security, productivity, enterprise, mobile, security, saas
     Adobe
By: Adobe     Published Date: Nov 10, 2015
With Adobe Document Cloud you can win and retain the best, slash costs and delays, and free everyone to focus on the projects that drive your organization forward.
Tags : ibm, human resources, talent, adobe, document cloud sales management, contracts, e-signatures, quote to cash
     Adobe
By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
     Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics