bring your own device

Results 101 - 125 of 173Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Sep 30, 2014
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock? The good news is IT can embrace BYOD with security and confidence given the right preparation and technology??
Tags : 
byod, device discovery, self-service portals, end users, knowledge management, mobile data systems, best practices
    
IBM MaaS360
Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity, business intelligence
    
Mitel
Published By: IBM MaaS360     Published Date: Feb 09, 2015
The time to implement a mobile device management (MDM) strategy is now! But where should you begin? Download this guide to learn the 12 best practices of Mobile Device Management.
Tags : 
ibm, fiberlink, mobile device management, mdm, mobile, mobile security, byod, bring your own device, mobile application, content management, security, it management, wireless, content management system, information management
    
IBM MaaS360
Published By: Box     Published Date: Oct 18, 2012
In a mobile-centric world, IT has a new challenge on its hands: ensuring that users can access and collaborate on content anytime, anywhere an on any device. Here are the top five challenges, and how to overcome them.
Tags : 
box, mobile collaboration, access, bring your own device, content, sharing, it management, enterprise applications
    
Box
Published By: Box     Published Date: Oct 18, 2012
A modern mobile IT strategy is no longer an option, it is an absolute business necessity
Tags : 
box, mobile it strategy, bring your own device, mobile file sharing, collaboration, enterprise applications, mobile computing, mobile workers, telecom
    
Box
Published By: RingCentral     Published Date: Dec 05, 2013
Employees today want to be able to choose their own mobile devices based on their preferred design and functionality, a trend known as “bring your own device,” or BYOD. This can be a boon to the organization, but it is also a risk. This study explains why.
Tags : 
ringcentral, mobile devices, mobile workers, cellphone, bluetooth, wireless, cell phone, iphone, blackberry, communications, pda, smart phones, wireless communications, wireless infrastructure
    
RingCentral
Published By: IBM     Published Date: Apr 22, 2014
According to the recent Gartner Magic Quadrant for ON-Premises Integration Suites, application integration patterns were originally applied for internal, application-to-application (A2A) integration and for integrating an organization's applications with that of its trading partners - known as B2B integration. Today, these patterns are applied to a broader array of application integration projects, such as creating new compositions using mobile apps and on-premises back-end services in support of bring-your-own-device initiatives.
Tags : 
ibm, integration, application integration, application integration suites, mobile apps, back-end services, byod, application integration projects, websphere, a2a, cloud based application integration
    
IBM
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices, mobile workers, mobile security, network security, remote access, access control, email security, hacker detection, web service security, data protection, database security, cloud computing
    
GlobalSCAPE
Published By: IBM MaaS360     Published Date: Apr 15, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, application security, mobile computing, mobile data systems, mobile workers, application integration, application performance management, enterprise software
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, application security, mobile computing, mobile data systems, mobile workers, application integration, best practices, business management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, manufacturing, application security, mobile computing, mobile data systems, mobile workers, smart phones, business intelligence, database security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : 
byod, mobile devices, smartphone, tablet, networking, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security, wireless, business intelligence
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : 
ibm, bring your own device, byod, mobile, security, mobile computing, mobile data systems, mobile workers, smart phones
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at IT’s challenges in managing Bring Your Own Device (BYOD) for today’s organizations
Tags : 
ibm, mobile, mobile device management, mdm, security, mobile computing, mobile data systems, mobile workers, smart phones
    
IBM MaaS360
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications, mobile computing, mobile data systems, wireless application software
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications, mobile data systems, wireless application software
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: BlackBerry     Published Date: Mar 11, 2013
Find out about the key factors in any Enterprise Mobility Management (EMM) solution, including manageability, security and support. Then learn how BlackBerry® 10 addresses each one, and more.
Tags : 
blackberry, enterprise, blackberry enterprise 10, smart choice, byod, bring your own device, addresses, knowledge management, enterprise applications
    
BlackBerry
Published By: F5     Published Date: Jan 25, 2013
Microsoft Exchange 2013 offers ways to meet productivity challenges but presents changes your infrastructure. This F5 paper takes a closer look at how the migration affects your infrastructure and offers strategies for ensuring a smooth transition.
Tags : 
architect, f5 networks, migration, network migration, smooth transition, network mobility, byod, bring your own device, infrastructure, it management, knowledge management, data center
    
F5
Published By: IBM     Published Date: Oct 10, 2013
This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as opposed to customers.
Tags : 
effective mobile enterprise, enterprise programs, mobile enterprise, guidance to strategize, guidance to implement, implement efficiently, effective implementation, corporate device, byod, programs for employees, mobile capabilities, how-to, enterprise partners, development and support, wireless, business intelligence
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
As your employees bring their own smartphones and tablets to the workplace, you need to create a flexible mobile environment that allows personally owned and corporate-issued devices to co-exist. IBM Mobile Enterprise Services for managed mobility is designed to help reduce the complexity that comes with multiple mobile platforms. IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this report, you’ll learn how these companies: Increased employee productivity and satisfaction; expanded revenues from improved sales mobility, and decreased replacement, mobility infrastructure and support costs.
Tags : 
managed mobility, byod, michelle evangelista, bring your own device, mobile, flexible, mobile environment, ibm mobile enterprise services, mobile enterprise, managed mobility, mobile platforms, roi, employee productivity, sales mobility, mobility infrastructure, mobile computing, return on investment, telecom
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
e IBM journey toward unified communications for mobile and social collaboration. Many of today's innovations are driven by the consumer marketplace, and the workplace is no exception. As consumers, we are very familiar with new ways for people to find each other, keepin touch, share ideas and be mobile, getting information from many place. As employees, we would like to apply these consumer capabilities to our work - seamlessly and on a global basis - to make us more productive and effective with business colleagues, clients and business partners. This white paper discusses IBMs infrastructure transformation over the first 12 years, summary value proposition, and volution in supporting mobile devices and BYOD.
Tags : 
collaboration, infrastructure, mobile, social, communication system, unification, mobile collaboration, social collaboration, byod, ibm, bring your own device, infrastructure, infrastructure transformation, summary value proposition, mobile devices, telecom
    
IBM
Published By: Cisco     Published Date: Sep 15, 2015
In collaborative spaces, people naturally share ideas, which leads to innovation and growth. But how do you design a workplace that provides a highly collaborative atmosphere and that incorporates what people want? According to the Cisco® 2014 Connected World Technology Report, the top five workplace trends are: • Flexibility and coworking • Space customization • Employee wellness • Sustainability • Bring-your-own-device (BYOD) programs
Tags : 
collaboration, workplace, innovation, byod, convergence, wireless communications, enterprise software
    
Cisco
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.