bring your own device

Results 51 - 75 of 173Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Oct 24, 2016
This report explores the four elements of an enterprise mobility strategy and how to address the challenges that your enterprise may face in a mobile environment.
Tags : 
enterprise mobility management, mobility, mobile devices, bring your own device, remote access, mobile computing, mobile workers
    
Microsoft
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications
    
PulseSecure
Published By: Aerohive     Published Date: May 13, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing, infrastructure, design and facilities
    
Aerohive
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software, mobile computing, mobile data systems, smart phones, wireless application software, wireless communications, wireless hardware, wireless phones
    
HP - Enterprise
Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
This white paper explains how you can unleash the full potential of mobility - greater productivity, flexibility, and better economics - by unifying secure device access, user authentication, provisioning, and management.
Tags : 
byod, bring your own device, it infrastructure, mobile workforce, mobility
    
HP OMG Mobile Workforce
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : 
holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device, it management, enterprise applications, data management, data center
    
Sponsored by HP and Intel®
Published By: IBM     Published Date: Oct 10, 2013
This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as opposed to customers.
Tags : 
effective mobile enterprise, enterprise programs, mobile enterprise, guidance to strategize, guidance to implement, implement efficiently, effective implementation, corporate device, byod, programs for employees, mobile capabilities, how-to, enterprise partners, development and support, wireless, business intelligence
    
IBM
Published By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
mobile, enterprise, application gap, pcs, byod, data, networking
    
Citrix
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, virtualization, cloud computing, design and facilities
    
Aerohive
Published By: Box     Published Date: Oct 18, 2012
A modern mobile IT strategy is no longer an option, it is an absolute business necessity
Tags : 
box, mobile it strategy, bring your own device, mobile file sharing, collaboration, enterprise applications, mobile computing, mobile workers, telecom
    
Box
Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management, data management
    
Cisco
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: Box     Published Date: Oct 18, 2012
In a mobile-centric world, IT has a new challenge on its hands: ensuring that users can access and collaborate on content anytime, anywhere an on any device. Here are the top five challenges, and how to overcome them.
Tags : 
box, mobile collaboration, access, bring your own device, content, sharing, it management, enterprise applications
    
Box
Published By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: SAP     Published Date: Jul 18, 2012
An increasing number of organizations are permitting employees to bring their own mobile devices into the workplace to be used for work purposes. While this practice may first appear to reduce enterprise mobility costs while increasing employee productivity, it also poses new risks and may actually increase costs if not properly managed. Know how to cost-effectively manage this Bring-Your-Own-Device (BYOD) phenomenon.
Tags : 
technology, mobile, byod, bring-your-own-device, mobile devices, mobile computing, mobile data systems, smart phones, wireless application software
    
SAP
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, security, it management, data management, content management system, document management, information management, secure content management
    
Globalscape
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices, mobile workers, mobile security, network security, remote access, access control, email security, hacker detection, web service security, data protection, database security, cloud computing
    
GlobalSCAPE
Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Cisco     Published Date: Nov 08, 2012
Forrester Consulting delivers a 2012 summary of trends and survey results from organizations with 100-1500 employees.
Tags : 
byod, bring your own device, cisco, mobility, workplace mobility, byod deployment, mobile computing, mobile data systems, data center
    
Cisco
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Ultimately, technology can minimize compromises so that everyone becomes a winner. In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility is a compromise-free approach, and how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices, business analytics, enterprise resource planning
    
VMware AirWatch
Published By: IBM     Published Date: Apr 22, 2014
According to the recent Gartner Magic Quadrant for ON-Premises Integration Suites, application integration patterns were originally applied for internal, application-to-application (A2A) integration and for integrating an organization's applications with that of its trading partners - known as B2B integration. Today, these patterns are applied to a broader array of application integration projects, such as creating new compositions using mobile apps and on-premises back-end services in support of bring-your-own-device initiatives.
Tags : 
ibm, integration, application integration, application integration suites, mobile apps, back-end services, byod, application integration projects, websphere, a2a, cloud based application integration
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.