Skip to main content
 

byod

Results 151 - 175 of 491Sort Results By: Published Date | Title | Company Name
Published By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.
Tags : 
agency it, workforce mobility, mobile productivity, cloud computing
    
Lenovo
Published By: Lenovo     Published Date: Jan 22, 2015
Looking for smarter solutions for anywhere agency productivity? Watch webNetwork for Government and learn how webNetwork Unified Workspaces are the right choice for secure, reliable, mission-ready mobility. No more worries about balancing competing priorities around access, accountability, and cost - webNetwork makes IT management easy with simple deployment and a superb end-user experience.
Tags : 
webnetwork, byod, webnetwork unified workspaces, it management, cloud-powered solutions, vdi or cloud
    
Lenovo
Published By: Lenovo     Published Date: Jan 29, 2015
This paper begins with an examination of BYOPC and its shortcomings. It closes with a look toward the future – Consumerization – and how cloud and web services are combining to finally deliver on the advantage of the new realities of BYOD.
Tags : 
consumerization, advantage, byod, cloud, web services
    
Lenovo
Published By: Mitel     Published Date: Jun 29, 2016
Dagens affärsvärld rör sig allt snabbare. Konkurrensen blir tuffare, tekniken mer avancerad och spelfältet är globalt. Kultur, teknik och fysiska element samverkar och gör att förhållandena förändras snabbare än någonsin. Ett exempel är att allt mer frihet efterfrågas när det gäller sättet att arbeta, och trenden med egna enheter (BYOD). Ett annat är att tekniken utvecklas allt snabbare med nya enheter, plattformar och tillämpningar. Allt detta gör att gränserna mellan länder och regioner suddas ut allt mer.
Tags : 
bästa praxis, företag optimering, företagsledning, produktivitet, business intelligence, work 3.0, bring your own device
    
Mitel
Published By: Mitel     Published Date: May 18, 2017
The ways teams collaborate has fundamentally changed in the last few years. There are seemingly endless tools, apps and software that claim to transform the collaboration experience. Some do more to make good on that promise than others—and you can’t forget to account for the context for how they fit into your organization’s overall IT mix and processes. Given all this change, here are a few important things to know about team collaboration and the tools associated with it to help you get the most of collaboration for your company.
Tags : 
byod, cloud-based, applications, collaboration software
    
Mitel
Published By: VMware     Published Date: May 10, 2017
The next era of BYOD has arrived and IT departments are now thinking about BYOD as a strategic value-add rather than a threat that needs to be controlled. Today’s savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight and enable employees to complete a business task at a moment’s notice, on any device. Download this eBook to reveal the five best practices business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : 
next-generation firewall, byod, social media, applications, it trends
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : 
next-generation firewall, byod, social media, applications, it trends
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, compliance, mobile, tablets, byod, cloud
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jan 24, 2013
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.
Tags : 
consumerization, byod, risk management, security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
HP - Enterprise
Published By: LifeSize, a division of Logitech     Published Date: Feb 01, 2013
Do you work smarter on your own tablet, smartphone or laptop? Go for it, says corporate IT. Read this white paper to learn how BYOD is an emerging trend in business policy. In a recent survey 44% of firms have embraced BYOD. Will you do the same?
Tags : 
byod, bring your own device, simplicity, tablet, smartphone, laptop, byod party, lifesize
    
LifeSize, a division of Logitech
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
Includes "Top 5 Reasons Why Companies Allow Employees to Use Personal Devices for Work," and "3 Steps Toward Consumerization"
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum, computing, cloud
    
Trend Micro Inc.
Published By: apperian     Published Date: Apr 13, 2012
Uncover the benefits of BYOD and learn how the proper technology combined with effective policies can enable employees to increase productivity while protecting your company assets at the same time.
Tags : 
apperian, mobile device, technology, it management, technology device, business technology
    
apperian
Published By: apperian     Published Date: Apr 13, 2012
The BYOD demand was initially created by the popularity of the iPhone and the iPad from Apple. Relying on the closed iOS operating environment, these devices presented a fairly straightforward challenge for businesses that wanted to allow access to corporate apps without compromising the security of company data. Read to find out more.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management
    
apperian
Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, byod, grc
    
ForeScout
Published By: ForeScout     Published Date: Feb 18, 2014
Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.
Tags : 
forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security, end-user mobility, byod, enterprise
    
ForeScout
Published By: CDW-Apple     Published Date: Dec 10, 2012
In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business applications from smartphones.
Tags : 
mobile, cdw, mobile integration, byod, it policy, business mobile integration, mobile it
    
CDW-Apple
Published By: CDW-Apple     Published Date: Dec 12, 2012
The ultimate reference guide to taking your business mobile.
Tags : 
mobile, mobile integration, byod, it policy, business mobile integration, mobile it
    
CDW-Apple
Published By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
: Interested in knowing what CIOs and other IT executives really think about the future of enterprise mobility? Enterprise Mobile uncovers the results of a survey conducted to assess the business impact of enterprise mobility based on input from technology leaders. The webinar provides tips to prepare for the future of enterprise mobility, secrets to removing barriers to mobile strategy implementation, and shares trends around how other companies are embracing mobile security.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.