byod

Results 326 - 350 of 495Sort Results By: Published Date | Title | Company Name
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Companies today can’t just “bolt on” mobile capabilities. To succeed, you have to put mobile first. Read—Moving Beyond BYOD to Mobile First: A 3-Step Approach for CIOs—to learn how a making mobile a core part of your IT strategy increases revenue.
Tags : 
mobile collaboration, byod management, byod solutions, byod strategy, enterprise collaboration, enterprise mobility, mobile device management
    
Good Technology Corporation
Published By: IBM     Published Date: Feb 27, 2014
Learn the best practices that the mobile technology leaders are using and see how your organization could benefit from an infrastructure that supports mobile devices and other mobile solutions.
Tags : 
mobile, best practices, mobile technology, mobile solutions, mobile devices, mobile collaboration, byod, bring your own device, mobile applications, network, device
    
IBM
Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: IBM     Published Date: Oct 10, 2013
The ubiquity of mobile devices is transforming the ways that business gets done in today’s world. IBM has the services that can help go beyond supporting devices to achieve a flexible, powerful mobile enterprise.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Consumerization of IT (with BYOD) and mobile-cloud initiatives are quickly becoming the norm in order for businesses to stay competitive. This is forcing organizations to think beyond basic end user productivity and collaboration, and embrace modern business mobility initiatives that require reengineering core business processes to a mobile-cloud model.
Tags : 
    
VMware AirWatch
Published By: eZuce     Published Date: Aug 15, 2013
Want to enable employees to communicate and collaborate socially on a secure internal network? Gain control of BYOD? Eliminate your aging PBX and replace it with a modern, software-only cloud solution? This exclusive research study from internationally renowned Wainhouse has identified the top barriers for UC projects: high costs and slow implementation, leading to high Total Cost of Ownership (TCO). But there are ways to easily overcome both these barriers and ensure UC success. Download the paper today and learn more about how to use UC to drive business business results for your organization.
Tags : 
tco, total cost of ownership, unified communications, virtualization, cloud communications, communication and collaboration, social collaboration, it costs, cut it costs, virtualized communication, secure buy-in, driving it innovation, uc adoption, byod, manage byod, control byod
    
eZuce
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod
    
IBM
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Published By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
    
Frontier Communications
Published By: Fortinet     Published Date: Nov 14, 2012
How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Tags : 
fortinet, byod, data loss, market fragmentation, malware, mobile devices, risk, bring your own device, mobile security, mobile device management
    
Fortinet
Published By: Box     Published Date: Jun 11, 2014
Global energy management giant based in France rolled out Box to 67,000 employees, enabled BYOD, and boosted productivity. Use Box for RFPs, vendor collaboration, executives, sales presentations. Cut server costs by 30%. Energy industry, large company, EMEA, global, sales LOB, BYOD, server replacement.
Tags : 
box, schneider, electric, vendor collaboration, global sales, lob, byod, server replacement
    
Box
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod
    
IBM MaaS360
Published By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.
Tags : 
agency it, workforce mobility, mobile productivity, cloud computing
    
Lenovo
Published By: CA Technologies     Published Date: Mar 06, 2015
Semplificare la sicurezza e la gestione per le app di livello enterprise e il BYOD
Tags : 
    
CA Technologies
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft
Published By: Dell     Published Date: Sep 12, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : 
cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy
    
CDW
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.
Tags : 
ibm, security, risk management, mobile device security
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.