Skip to main content
 

byod

Results 276 - 300 of 491Sort Results By: Published Date | Title | Company Name
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
    
Aerohive
Published By: Aerohive     Published Date: Jul 03, 2012
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. This white paper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
byod, mobility, productivity
    
Aerohive
Published By: Aerohive     Published Date: Oct 01, 2012
Best Practices to prepare your WLAN for BYOD and the Consumerization of IT
Tags : 
aerohive, free, webinar, cio, byod, wlan, consumerization
    
Aerohive
Published By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) transforms the workplace, making it more productive, efficient and effective. Hosted UC service providers remotely deliver and manage various communications services using shared resources enabling customers to consolidate and outsource much, or possibly all, of their communications and collaborations needs for a fixed monthly cost. This whitepaper details the top reasons to consider a hosted unified communication solution for your enterprise.
Tags : 
unified communication, unified collaboration, enterprise unified communication, hosted unified communication, hosted uc, hosted ucaas, uc total cost of ownership, uc tco, uc deployment, deploying uc, byod, arkadin, microsoft lync, collaboration solutions, conferencing solution, collaboration services, conferencing services, unified communication as a service
    
Arkadin
Published By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) is a set of communications and collaboration products that provide end users with a single interface and experience across multiple device and media types. UC allows employees to collaborate more efficiently while lowering the overall cost of communications. This whitepaper reveals market trends, how to evaluate one solution vs. another, and the range of deployment options all critical to selecting the right UC solution for your organization
Tags : 
unified communication, unified collaboration, enterprise unified communication, deploying uc, byod, arkadin, microsoft lync, collaboration solutions, conferencing solution, collaboration services, conferencing services, unified communication as a service, efficiency with uc, productivity with uc, uc business value
    
Arkadin
Published By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : 
malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : 
cisco, security, next-gen threat defense, byod, saas, firewalls, next-generation firewalls
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
Comprehensive network visibility and control increases business efficiency and enables business growth while maximizing security.
Tags : 
cisco, next-generation firewall, byod, bring your own devise
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
This document is a Cisco Validated Design (CVD) for Cisco Bring Your Own Device (BYOD) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for deploying personal, corporate, and guest devices onto a network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a BYOD solution, this CVD will continue to evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution.
Tags : 
cisco, byod, wireless, bring your own device, cisco validated design, cvd
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
Latest IT Trends For Secure Mobile Collaboration
Tags : 
cisco, byod, bring your own device, mobile, mobile collaboration, it trends
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
A Model of BYOD’s Benefits to Global Companies
Tags : 
cisco, byod, global companies, cisco ibsg, bring your own device.
    
Cisco
Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security
    
Globalscape
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about two approaches for efficient WLAN design and see how you can seamlessly integrate 802.11ac into your WLAN in order to lay the foundation for the future of high-speed technologies.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: Dropbox for Business     Published Date: May 07, 2015
It's all about Usability. Help educate your prospects about the shifting role of IT and share best practices for evaluating technology in a BYOD world.
Tags : 
usability, employee performance, consumerization, application adoption, best practices, byod, data management, ofs, productivity
    
Dropbox for Business
Published By: TIBCO     Published Date: Aug 18, 2014
Today, the open API is one of the most powerful sources of competitive advantage. It comes down to the potential of your data and services. Download this new eBook to learn how a well thought-out API strategy can help you compete and grow in new ways.
Tags : 
tibco, api, byod, end user intelligence, business intelligence, byod, mobile device users, business strategy, social media
    
TIBCO
Published By: IBM MaaS360     Published Date: Sep 30, 2014
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock? The good news is IT can embrace BYOD with security and confidence given the right preparation and technology??
Tags : 
byod, device discovery, self-service portals, end users
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : 
maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod, emm solution, mobility
    
IBM MaaS360
Published By: Cloud Sherpas     Published Date: Aug 13, 2015
In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure
Tags : 
google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development, google apps resellers, google cloud solutions, cloud enterprise solutions, google apps setup, google apps partners, google reseller, google apps authorized reseller, google apps for work, google drive for work, google chrome for work, google apps reseller
    
Cloud Sherpas
Published By: VMware AirWatch     Published Date: Dec 09, 2016
Thanks to the rising importance of business mobility, the BYOD trend, and improvements in the underlying technology, the adoption rate of desktop virtualization is faster today than ever before. But as enterprises move to virtualization as a foundation for end-user computing strategies, more agile, high-performing infrastructures are needed. Download this white paper to learn why software-defined data centers (SDDC) are an attractive infrastructure option for virtualization. Inside, you’ll gain access to different articles featuring: Why infrastructure matters in desktop and application virtualization Building the future of the desktop on the software-defined data center SDDC-powered virtual desktop and application benefits And more
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
    
VMware AirWatch
Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity
    
Mitel
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.