Skip to main content
 

mobile device management

Results 301 - 325 of 365Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Cisco     Published Date: Jan 12, 2016
Higher education has come under increasing scrutiny as never before due to rising costs, changes in future job requirements, and new forms of learning opportunities offered by non-traditional companies and institutions. Students and parents are rightfully questioning the value of higher education based on perceived outcomes as well as staggering student loans that in some cases could take a lifetime to pay back. While the value equation debate rages on, there is another phenomenon taking place. It is nothing short of a revolution regarding the advances in technology and how institutions of higher learning along with nontraditional organizations are utilizing these powerful new tools. These new tools include new mobile devices, enhanced and feature-rich learning management systems, data-feeding sensors, 3D printers, smart classrooms, smart buildings, and collaboration tools allowing students and faculty to collaborate just about anywhere face-to-face, virtually.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education
    
Cisco
Published By: Motorola     Published Date: Feb 06, 2008
In this report, Aberdeen takes an in-depth look at how best-in-class organizations are using mobile messaging to improve productivity and customer service. They also define the steps that can help your organization deploy a best-in-class enterprise mobile messaging solution.
Tags : 
mobile email, sms, mms, mobile im, mobile voip, enterprise mobile messaging, mobile security, unified mobile messaging, mobile roi, interoperability, mobile device platform, mobile device management, motorola, motorola good
    
Motorola
Published By: IBM MaaS360     Published Date: Apr 04, 2016
Learn how to become an enterprise mobility Mowglie. In today’s completely connected mobile jungle, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses to survive and deliver an optimal experience. The MaaS360 suite from IBM allows for a robust app development platform where users can become mobile Mowglies and increase portability and interoperability. Download this e-book to create a failsafe Enterprise Mobility Survival Guide and build the best mobile environment for your users and employees.
Tags : 
ibm, mobile, management, guide, app development
    
IBM MaaS360
Published By: CDW     Published Date: Jun 14, 2016
For most organizations, the question of whether to deploy mobile computing has long since given way to the question of how. And many are only in the early stages of mobility maturity. An expertly conceived strategy is necessary to achieve the innovation that mobility can provide.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
CDW
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
    
CDW
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
    
Aerohive
Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services, consumer devices, security support, android security support, one touch access, scanning, right devices, data capture, durability, touch computer, mobile computers, powerful computing performance, mobile device management
    
Zebra Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Lookout     Published Date: Dec 13, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
mobile security, mobile device management, identity management, network attacks, malicious apps
    
Lookout
Published By: BlackBerry     Published Date: Jul 17, 2008
Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand. An exclusive Computerworld online survey offers insight into how companies can develop cost-effective strategies for implementing or improving mobile applications and foster an efficient workplace.
Tags : 
blackberry, unified communications, rim, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Mobile devices are small—many of them fit right into the palm of the hand—so why is handling a successful mobile infrastructure such a big hassle? The right provider can help with everything from planning and strategy to ongoing support and analytics. But how do you find the right provider? Our Mobility Services RFP template will guide you through the process.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile management, device management, rfp
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Mobile devices are small—many of them fit right into the palm of the hand—so why is handling a successful mobile infrastructure such a big hassle? The right provider can help with everything from planning and strategy to ongoing support and analytics. But how do you find the right provider? Our Mobility Services RFP template will guide you through the process.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile management, device management, rfp
    
Enterprise Mobile
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: QTS Data Centers     Published Date: Jun 09, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : 
cloud security technologies, cloud security purchases, bring your own device, mobile device management
    
QTS Data Centers
Published By: Microsoft Surface     Published Date: Feb 14, 2017
There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognizing the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.
Tags : 
    
Microsoft Surface
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: VMware     Published Date: May 10, 2017
Organizations understand they must rethink traditional approaches to application delivery and management to stay relevant in an increasingly digital world. A consumer-simple, enterprise-secure digital workspace that unifies user, desktop, and mobile device management to deliver business outcomes can be the foundation for business mobility projects directly linked to process change and innovation. Find out how digital workspace first-movers experience business, operational, and financial benefits while those that wait are falling behind, by downloading this State of the Digital Workspace report.
Tags : 
    
VMware
Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Before you take that fatal next step in allowing mobility, security, BYOD and user flexibility, carefully read these top 10 reasons why you don't need mobile device management.
Tags : 
    
IBM MaaS360
Published By: Xora, A ClickSoftware Company     Published Date: Jun 30, 2014
Turn Your Field Services Employees’ Mobile Devices into Productivity Tools
Tags : 
xora, mobile devices, workforce management, business apps
    
Xora, A ClickSoftware Company
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.