RSS feed Get our RSS feed

News by Topic

byod

Results 351 - 375 of 493Sort Results By: Published Date | Title | Company Name
By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : iboss, remote access, byod, cybersecurity, mobile workforce
     iboss
By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : ibm, security, risk, byod, safeguard, protection, threat protection, it security
     IBM
By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : byod, device discovery, data privacy, data security, it security, security
     Kaspersky Lab
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : security, firewall, next generation, applications, byod, threats
     Cisco
By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : security, firewall, next generation, applications, byod, threats
     Cisco
By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : security, firewall, next generation, applications, byod, threats
     Cisco
By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : cisco, security, next-gen threat defense, byod, saas, firewalls, next-generation firewalls
     Cisco
By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod
     Aerohive Networks
By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies
     CA Technologies
By: Plantronics     Published Date: May 20, 2016
This white paper reveals seven necessary technologies to help ensure end users can take full advantage of web conferencing, from wherever they happen to be.
Tags : web conference, technology, web meetings, web conferencing, online conference, mobility, video conference, security
     Plantronics
By: Polycom     Published Date: Feb 25, 2015
The workplace is undergoing fundamental changes, with people persistently connected by digital collaboration technologies and an evolving work environment. Understanding these key trends will enable enterprises to prepare for and implement a collaborative workplace.
Tags : polycom, collaboration, connectivity, communication, deployment, video conferencing, infrastructure, user experience
     Polycom
By: apperian     Published Date: Apr 13, 2012
The BYOD demand was initially created by the popularity of the iPhone and the iPad from Apple. Relying on the closed iOS operating environment, these devices presented a fairly straightforward challenge for businesses that wanted to allow access to corporate apps without compromising the security of company data. Read to find out more.
Tags : apperian, technology, enterprise applications, mobile device, wireless communication, mobile management
     apperian
By: Avaya     Published Date: Jan 23, 2015
This paper provides information about solving the engagement challenge. When workers have flexibility in terms of tools, apps and devices, they can stay nimble, innovative and creative. In turn, they keep your company nimble, innovative and creative. To make it work you need to give workers the Unified Communications tools, apps and devices that allows them to better serve both internal and external customers. But that’s not as simple as it sounds. Organizations face enormous challenges in deciding whether and how to support consumer devices.
Tags : solving the engagement challenge, byod, byoa
     Avaya
By: Avaya     Published Date: Feb 06, 2015
This paper provides information about solving the engagement challenge. When workers have flexibility in terms of tools, apps and devices, they can stay nimble, innovative and creative. In turn, they keep your company nimble, innovative and creative. To make it work you need to give workers the Unified Communications tools, apps and devices that allows them to better serve both internal and external customers. But that’s not as simple as it sounds. Organizations face enormous challenges in deciding whether and how to support consumer devices.
Tags : solving the engagement challenge, byod, byoa
     Avaya
By: VMware AirWatch     Published Date: May 24, 2016
La mobilità resta un'opportunità strategica di primo piano per tutti i tipi di in quanto può rendere di rendere le imprese più competitive migliorando la produttività dei dipendenti oppure creando modalità innovative di coinvolgimento dei clienti. Per realizzare questa opportunità, la Enterprise Mobility deve fornire agli utenti un'esperienza di utilizzo fluida su più dispositivi e offrire un'area di lavoro sicura per le applicazioni di importanza critica. Per sostenere gli utenti di dispositivi mobili e la base clienti, le aziende devono attivare in modo sicuro le capacità BYOD (Bring Your Own Device, ovvero "Porta il tuo dispositivo") e self-service tramite una piattaforma solida, in grado di adattarsi adattarsi a nuovi processi.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence
     VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : byod, emm, mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : byod, emm, mobility, airwatch
     VMware AirWatch
By: Cisco     Published Date: Jan 12, 2016
This white paper will discuss the challenges currently facing local educational entities, describe 10 exemplary local alliances that enabled connection to CalREN in California, and finish with a set of recommendations for other local entities wishing to create a successful local consortium that could duplicate this success for themselves and for their local educational ecosystems.
Tags : cisco, byod, connectivity, education, networking environment, security
     Cisco
By: Citrix     Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : enterprise mobile, executive checklist, security, byod
     Citrix
By: Workforce Software     Published Date: Jun 04, 2015
This paper explores the BYOD trend, examines its intersections with workforce management, and provides recommendations on how organisations can maximise the return on their workforce management investments and practices in an increasingly mobile environment.
Tags : workforce software, byod, enterprise applications, mobile strategy, mobile devices
     Workforce Software
By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : wireless, infrastructure, wi-fi, mobile computing, byod, upgrade
     CDW
By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device
     VMware, Inc
By: IBM MaaS360     Published Date: Sep 30, 2014
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock? The good news is IT can embrace BYOD with security and confidence given the right preparation and technology??
Tags : byod, device discovery, self-service portals, end users
     IBM MaaS360
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics