Skip to main content
 

byod

Results 101 - 125 of 491Sort Results By: Published Date | Title | Company Name
Published By: Extreme Networks     Published Date: Feb 14, 2017
Los dispositivos móviles han irrumpido en los campus y centros educativos. Esto abre la posibilidad a todo un mundo de nuevas formas de aprendizaje, pero también plantea numerosos retos para la red y sus gestores. Este documento ofrece una valiosa orientacion para abordar con éxito estos desafíos.
Tags : 
    
Extreme Networks
Published By: Mitel     Published Date: Mar 30, 2017
The ways teams collaborate has fundamentally changed in the last few years. There are seemingly endless tools, apps and software that claim to transform the collaboration experience. Some do more to make good on that promise than others—and you can’t forget to account for the context for how they fit into your organization’s overall IT mix and processes. Given all this change, here are a few important things to know about team collaboration and the tools associated with it to help you get the most of collaboration for your company.
Tags : 
byod, cloud-based, applications, collaboration software
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Für intelligentere Geschäfte Die heutige Geschäftswelt wird zunehmend schnelllebiger, wettbewerbsorientierter und globaler, außerdem nimmt der Einfluss von Technologie immer mehr zu. Kulturelle, technologische und physische Elemente greifen ineinander und treiben den Wandel voran wie nie zuvor. Gefordert wird eine freiere Arbeitsgestaltung, der Trend zur „BYOD“-Praxis (bring your own device) setzt sich immer weiter durch, echnologieinnovationen und neue Geräte, Plattformen und Anwendungen halten immer weiter Einzug und internationale und regionale Grenzen werden überwunden.
Tags : 
    
Mitel
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Ping Identity     Published Date: Feb 12, 2016
Many enterprises today are actively pursuing mobile device initiatives—largely driven by the desire to support BYOD, which holds high potential for productivity gains as well as improved employee satisfaction.
Tags : 
    
Ping Identity
Published By: Ping Identity     Published Date: Feb 12, 2016
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Tags : 
    
Ping Identity
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
Known popularly as “Bring your own device”, or BYOD, the practice of working from personal devices is growing at a rapid pace.. And while security is real concern with BYOD, a recent survey found that employees are actually more cautious when using a personal device for work purposes
Tags : 
personal device, byod, survey
    
Citrix ShareFile
Published By: Lookout     Published Date: Dec 09, 2016
Many federal agencies claim they don't have a BYOD program. This survey of federal employees, however, says something different. Get data on personal device usage at work, who's breaking the rules, and more.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 09, 2016
This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 09, 2016
BYOD has made mobile security a much bigger challenge for enterprises. See what Forrester Consulting's national survey revealed.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Aerohive     Published Date: May 13, 2015
This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.
Tags : 
wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod, wireless, aerohive, aerohive security solutions, how to secure your network, wlan, wi-fi security
    
Aerohive
Published By: Aerohive     Published Date: May 13, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
This white paper explores the evolution of secure remote access requirements, focusing in particular on the impact of user mobility and growing adoption to bring your own device (BYOD) practices.
Tags : 
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.