RSS feed Get our RSS feed

News by Topic

mobile access

Results 226 - 250 of 401Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
     MobileIron
By: bigtincan     Published Date: Oct 10, 2014
Sales teams are the lifeblood of every organization, as they are tasked with acquiring market share and growing revenue. Access to corporate content – and understanding how to use it – is one of the greatest barriers salespeople must overcome. Mobile sales enablement is about providing dynamic, on-demand content that can be accessed during any selling situation.
Tags : mobile sales, mobile sales enablement, on-demand content, market share, emerging marketing, marketing research, sales
     bigtincan
By: Rapid7     Published Date: Jul 24, 2013
As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.
Tags : rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security
     Rapid7
By: Lookout     Published Date: Mar 28, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data.
Tags : mobile, security, modern, organizations, byod, lookout
     Lookout
By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
     Lookout
By: Epicor     Published Date: Feb 09, 2018
As mobile devices become increasingly essential to our working lives, your business—and your enterprise resource planning (ERP) system—must connect to these vital tools or risk losing to the competition. When employees can use their preferred devices to access information on demand, distributors like you can improve employee collaboration, increase productivity, and deliver exceptional customer service. In this Epicor eBook, you’ll discover how mobile technologies can integrate with your ERP solution to help you: • Instantly give customers what they want • Make faster business decisions • Use the right tools to enhance sales productivity Download the eBook to learn how else you can capitalize on greater mobility and grow your distribution business.
Tags : distribution, mobility
     Epicor
By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
     MobileIron
By: Panasonic Business Mobility Solutions     Published Date: Feb 08, 2017
Automotive and Large Equipment Service professionals need to be mobile - in the field diagnosing and solving customer equipment operation issues – fast. These highly skilled technicians and mechanics need reliable, quick access in real time to vehicle and customer information and service diagnostics systems.
Tags : 
     Panasonic Business Mobility Solutions
By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
     MobileIron
By: MobileIron     Published Date: Nov 14, 2017
Watch this interactive video to get an overview of Mobileiron's products and the access it can offer you!
Tags : mobileiron, software solutions, mobility management
     MobileIron
By: CBRE     Published Date: Aug 02, 2017
MobileIron Access Overview
Tags : mobileiron, access, software solutions
     CBRE
By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
     MobileIron
By: MobileIron     Published Date: Feb 12, 2019
The adoption of mobile and cloud technologies is driving massive change in organizations around the world. These new technologies enable organizations to streamline business processes, lower costs, and help employees work productively anywhere. However, securing mobile apps and cloud services requires more than passwords and legacy security approaches that aren’t designed for the mobile-cloud world.
Tags : 
     MobileIron
By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
     Secure Computing
By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : fiberlink, ciso, security, mobile, mobilephobia, corporate data
     IBM MaaS360
By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
     IBM
By: VMware     Published Date: May 10, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
     VMware
By: Microsoft Office 365     Published Date: Mar 11, 2016
The cloud gives businesses of all shapes and sizes an opportunity to be mobile. Employees get flexible, secured access to important data and applications from virtually anywhere. Documents are safely stored, synchronized, and shareable at a moment’s notice—collaboration on the go has never been easier.
Tags : 
     Microsoft Office 365
By: VMware     Published Date: Feb 24, 2017
IT organizations are largely siloed between the desktop and mobile management worlds. IT has addressed management of mobile devices with modern enterprise mobility management (EMM) solutions. However, Windows desktops have been managed separately using older PC lifecycle management (PCLM) technologies, which have fallen short of basic IT and end user expectations of today’s evolved, mobile-cloud workforce. The VMware AirWatch® Unified Endpoint Management (UEM) solution is a single, platform-independent approach for managing every device and every operating system across any organizational use case. The solution combines traditional client management requirements with modern EMM efficiencies enabling IT to deliver OS policies, patches, and apps over-the-air. Cloud-first management with instant push technologies and self-service capabilities ensure lower cost management, better security, and peak user experience regardless of the device being used to access the corporate environment.
Tags : 
     VMware
By: Aruba Networks     Published Date: Jul 03, 2013
The next-generation workplace is all about mobility. It has to be. By the end of 2013, there will be more Internet-connected mobile devices than people. Networking for the next-generation workplace must ensure that each device and business application has reliable service tailored to its performance needs. And that the network is right sized for mobility. Download this white paper to access the key characteristics of the network for the next-gen workplace…
Tags : 802.11ac, mobile technology, migration, 5ghz
     Aruba Networks
By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
     Good Technology Corporation
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
     Forcepoint
By: VMware AirWatch     Published Date: Nov 13, 2015
Prácticas recomendadas para implementar un programa BYOD productivo En los últimos años, «BYOD», que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los términos más utilizados en la empresa, al generalizarse el uso de los dispositivos móviles en muchas organizaciones. Sin embargo, además de ser un término que está de moda, su significado no es el de unas simples siglas. BYOD forma parte de una tendencia más amplia y arraigada: la consumerización de las TI, que se remonta al principio de la década de 2000. Por aquel entonces, casi todos disponían de un ordenador personal, con lo que podían trabajar desde casa fuera del horario laboral, así como disfrutar de las ventajas de utilizar los dispositivos de su elección y con los que se sentían más cómodos en lugar de usar los dispositivos corporativos que les proporcionaban los departamentos de TI.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And it’s not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobility’s promise.
Tags : hyland, offline access, mobility, remote access, mobile access, business applications
     OnBase by Hyland
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics