Skip to main content
 

byod

Results 301 - 325 of 491Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: Blackberry     Published Date: Jul 03, 2012
For virtually every enterprise today, mobile device management (MDM) is top of mind. And while security is a chief concern, smart organizations are also discovering new opportunities for productivity. Getting the most from the BYOD phenomenon requires strategic thinking. Find out what key elements to consider in your Enterprise Mobility Strategy. And learn how BlackBerry Mobile Fusion can improve mobile security, reduce TCO and improve productivity.
Tags : 
blackberry, cio, mobile, mdm, smartphones, tablet
    
Blackberry
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!
Tags : 
mobile device management, byod, andriod fragmentation, application deployment
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Feb 09, 2015
The time to implement a mobile device management (MDM) strategy is now! But where should you begin? Download this guide to learn the 12 best practices of Mobile Device Management.
Tags : 
ibm, fiberlink, mobile device management, mdm, mobile, mobile security, byod, bring your own device, mobile application, content management
    
IBM MaaS360
Published By: Ericom     Published Date: Nov 05, 2012
The accelerating BYOD trend and the need to reduce IT overhead, organizations need to empower users with secure browser-based access to Windows Applications and desktops from any device. Learn how AccessNow empowers mobility and security.
Tags : 
ericom, html5, rdp, accessnowt, windows apps, desktops, mobility
    
Ericom
Published By: RingCentral     Published Date: Dec 05, 2013
Employees today want to be able to choose their own mobile devices based on their preferred design and functionality, a trend known as “bring your own device,” or BYOD. This can be a boon to the organization, but it is also a risk. This study explains why.
Tags : 
ringcentral, mobile devices, mobile workers, cellphone, bluetooth, wireless, cell phone, iphone, blackberry, communications, mobile / wireless, network infrastructure, policy and legislation, document imaging
    
RingCentral
Published By: IBM     Published Date: Apr 22, 2014
According to the recent Gartner Magic Quadrant for ON-Premises Integration Suites, application integration patterns were originally applied for internal, application-to-application (A2A) integration and for integrating an organization's applications with that of its trading partners - known as B2B integration. Today, these patterns are applied to a broader array of application integration projects, such as creating new compositions using mobile apps and on-premises back-end services in support of bring-your-own-device initiatives.
Tags : 
ibm, integration, application integration, application integration suites, mobile apps, back-end services, byod, application integration projects, websphere, a2a, cloud based application integration
    
IBM
Published By: GlobalSCAPE     Published Date: Jul 16, 2012
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks.
Tags : 
globalscape, mobile devices, mobile security, file sharing, mobile workers, file transfering, cloud sharing, byod
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices, mobile workers, mobile security
    
GlobalSCAPE
Published By: Polycom     Published Date: Feb 25, 2015
The workplace is undergoing fundamental changes, with people persistently connected by digital collaboration technologies and an evolving work environment. Understanding these key trends will enable enterprises to prepare for and implement a collaborative workplace.
Tags : 
polycom, collaboration, connectivity, communication, deployment, video conferencing, infrastructure, user experience, digital, global, mobile, contextual, visual, byod, social
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
We are now in a world of Unified Communications (UC) and your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on a phone or mobile devices (BYOD). As IM becomes the new dial tone (“U there?”, “Is now a good time to talk”), when your users want to talk, they expect to be able to place their phone call from their UC client. For most companies today, that UC client is Microsoft® Lync®. While the user may want to place their phone call from Lync, they also want to be able to use a telephone dial pad to dial numbers, access features with convenient feature keys, and be able to choose between using a handset, headset, or speakerphone—and they want to use their phones in ways that are fully integrated with their Lync client.
Tags : 
mobile, lync, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality
    
Polycom
Published By: Polycom     Published Date: Jun 08, 2016
"Now you can reduce your overall communications costs, streamline business processes, and make employees more productive, How? With Polycom voice solutions and Skype for Business. The brief by ZK Research, Lowering the Cost of Communications—and Six More Real Benefits of Skype for Business Voice details how you can improve staff productivity, leverage existing UC solutions, consolidate infrastructure, get to market quicker, support BYOD, and pave the way for video. All while dramatically lowering your total cost of communications."
Tags : 
communication, network management, business intelligence, business management, best practices, productivity
    
Polycom
Published By: Polycom     Published Date: Jun 08, 2016
Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 15, 2015
A true integrated video collaboration solution should be able to connect disparate environments and provide a high quality and simple experience for users. Such a unified solution, when integrated into an intuitive, foolproof workflow for multipoint video collaboration, has the potential to transform the culture of video collaboration and realize highly leveraged end-to end group collaboration.
Tags : 
byod, collaboration, communicaitons, conferencing, enterprise, lync, microsoft, polycom, skype, video
    
Polycom
Published By: Polycom     Published Date: Sep 15, 2015
We are now in a world of Unified Communications (UC). Your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on phones or mobile devices (BYOD).
Tags : 
collaboration, conferencing, lync, microsoft, phone, polycom, skype, video, voice, voice over ip
    
Polycom
Published By: Polycom     Published Date: Sep 15, 2015
Complete voice and video solutions that extend Microsoft unified communications and empower user collaborative experiences
Tags : 
byod, collaboration, conferencing, lync, microsoft, phone, polycom, skype, video, voice over ip
    
Polycom
Published By: Polycom     Published Date: Nov 29, 2016
Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you.
Tags : 
    
Polycom
Published By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : 
discover, classify, endpoints, miercom, byod, iot
    
ForeScout
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : 
ibm, security, risk, byod, safeguard, protection, threat protection, it security, security iq
    
IBM
Published By: IBM MaaS360     Published Date: Apr 15, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.