mobile data access

Results 26 - 50 of 61Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure, ip networks, network security, access control, business continuity, security management, data protection, collaboration, productivity, cloud computing
    
Citrix Systems, Inc.
Published By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : 
cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development, it management
    
CDW
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Mobile productivity necessitates instant and easy access to retrieve, edit, share and send corporate data from anywhere. In this paper we’ll explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run all business from the palms of their hands.
Tags : 
mobile content management, mobile productivity, corporate data, access, workplace productivity, smartphones, tablets, networking, it management
    
IBM MaaS360
Published By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security, access control, security management, cloud computing
    
Citrix Systems
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, network security, application security, mobile computing, mobile data systems, mobile workers, application integration, application performance management, best practices
    
IBM MaaS360
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data, wireless
    
CDW
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
    
Intralinks
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft, it management, mobile computing, mobile workers, smart phones, wireless security
    
Globalscape
Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company’s intranet portal available to employees on the go? Do employees need mobile access to your back-office systems while ensuring data on mobile devices is secure? Do users want to use their own mobile devices to access corporate data and applications? Download the datasheet to get in depth approaches to addressing these challenges.
Tags : 
intranet portal, on the go, mobile access, back-office systems, secure, ensure data, mobile devices, datasheet, access corporate data, applications, mobile data systems, wireless communications, wireless phones
    
Nativeflow
Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm, mobile computing, mobile data systems, customer relationship management
    
Oracle
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: NetApp     Published Date: Sep 24, 2013
"Today, enormous amounts of data are being created from a variety of sources, such as applications, new mobile devices, big data analytics, and the cloud. This is changing the speed with which business gets conducted and the scale in which it occurs. Moreover, the digital explosion shows no sign of slowing and IDC expects the amount of data being stored to grow in excess of 50% per year over the next few years. Discover how flash technology is being deployed to improve performance and efficiency for these demanding environments. Access this IDC whitepaper to learn more about the role of flash technology and the importance of flash solutions that are designed specifically for the enterprise."
Tags : 
data, cloud, data centers, mobile devices, flash technology, flash solutions, netapp, enterprise applications, storage, data management, data center
    
NetApp
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, data center
    
CDW Symantec
Published By: Box     Published Date: Jun 11, 2012
This paper examines the market drivers, inhibitors, and top vendors in this segment, including Box, Citrix Sharefile, Dropbox, Egnyte, Nomadesk, Sugarsync, Syncplicity and YouSendIt.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, wireless, enterprise applications, collaboration, contact management
    
Box
Published By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, networking, storage, virtualization, cloud computing
    
Box
Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, security, enterprise applications, convergence, infrastructure
    
Box
Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Start   Previous    1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.