RSS feed Get our RSS feed

News by Topic

mobility

Results 226 - 250 of 1396Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Nov 12, 2015
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : vmware, byod, workspace mobility, airwatch
     VMware AirWatch
By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : mobile management, mobile devices, enterprise management, information technology, best practices, business optimization
     VMware AirWatch
By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : prepare for mobility, byod, requirements for mobility and byod
     Aerohive
By: Aerohive     Published Date: May 14, 2015
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : prepare for mobility, byod, requirements for mobility and byod
     Aerohive
By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software
     Absolute Software
By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
     Enterprise Mobile
By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief to ensure your organizations bring-your-own-device (BYOD) policy is a win-win situation.
Tags : enterprise mobile, byod, bring your own device, byod policy, byod strategy, mobility services
     Enterprise Mobile
By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : prepare for mobility, byod, requirements for mobility and byod
     Aerohive
By: Aerohive     Published Date: Aug 03, 2015
Dieses Whitepaper dient als Leitfaden und erläutert die nötigen Anforderungen an Konnektivität und Produktivität, um Ihr Netzwerk auf die Mobilitätswelle vorzubereiten.
Tags : mobility, mobility technology, wireless. connectivity, network, security, byod
     Aerohive
By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : cloud computing, infrastructure, marketplace, application, hybrid, enterprise
     Cisco
By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : networking, enterprise, architecture, applications
     Cisco EMEA
By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : case study, web security, cloud, mobility, mobile security, web security solutions, security
     Webroot
By: Webroot     Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security.
Tags : endpoint security, web security, it security, security solutions, case study, mobile security, mobility, security
     Webroot
By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : device management, security management, mobility, application security, management solutions
     Centrify
By: IBM MaaS360     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile, emm, mobile management strategy, mobile device management
     IBM MaaS360
By: CDW     Published Date: Oct 10, 2013
Integrate and simplify mobility management with total mobility management from CDW.
Tags : byod, mobility management, total mobility, leverage practices, mobile device management, mdm, mobility strategies, wireless networks
     CDW
By: CDW     Published Date: Oct 10, 2013
CDW’s Mobile Expense Management solution enables organizations to view, integrate and manage mobile communications costs across the entire organization in order to make more informed strategic decisions.
Tags : mobility management, mobile expense management, total mobility, cdw, expense management, mobile expense, historical invoice audit, invoice process
     CDW
By: CDW     Published Date: Oct 10, 2013
Let CDW’s Total Mobility Management experts help address your mobility needs with the right mix of solutions, services and support.
Tags : managed mobility, mobility management, support services, cdw, solution architects, managed mdm services, mdm administration, help desk
     CDW
By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app
     CDW
By: HP     Published Date: Jan 19, 2012
Our networks are under great strain today - more data, video, audio, new applications, mobility, virtualization and so much more. In this program, leading experts from Gartner and HP address your most pressing questions and concerns, including what challenges are weighing most on the public sector?
Tags : technology, networking, puiblic sector organizations, solutions
     HP
By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : hardware, tpm, it security, windows, telecommunication, byod
     Dell
By: Acronis EMEA     Published Date: May 19, 2015
Download this paper to uncover the steps needed to mobilise your workforce and become more productive.
Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
     Acronis EMEA
By: Sitecore     Published Date: Mar 03, 2016
Access this case study video and PDF to learn how this pioneering digital team has managed the rapid growth of user mobility before, during, and after every zoo visit to achieve a: - Whopping 200% increase in mobile conversions - Industry-leading 20% app visitor penetration rate - Simplified and clearer messaging structure - Stronger customer understanding
Tags : 
     Sitecore
By: CA Technologies     Published Date: Mar 06, 2015
Sebbene il concetto di application programming interface (API) possa apparire obsoleto, esso è in realtà in corso di trasformazione, perché un numero crescente di aziende, incentivate dalle esigenze di mobility e cloud, tende a esporre le proprie risorse informative a sviluppatori terzi.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn’t in the software business, you’re wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement
     CA Technologies
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics