byod

Results 251 - 275 of 496Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management, mobile device management, data loss prevention
    
CDW
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
According to Time, as much as 40% of social network users are exposed to some form of malware.
Tags : 
firewall, security, social media, threats, web2.0, consumerization, byod, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management, business technology
    
Dell SonicWALL
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Dell™ SonicWALL™ thought leaders identify top IT security drivers for the year ahead.
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management, application intelligence, whitepaper, cloud, byod, enterprise, security, it management, anti spam, anti spyware
    
Dell SonicWALL
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : 
firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management, application intelligence, whitepaper, mobile, social, tablets, byod, security, anti spam, anti spyware, anti virus, hacker detection, internet security
    
Dell SonicWALL
Published By: Kaseya     Published Date: Oct 03, 2013
Eight Keys to Cloud Friendly System Management
Tags : 
kaseya, cloud, cloud computing, system management, cloud migrations, lan, public cloud, private cloud, hybrid cloud, byod, software development, it management
    
Kaseya
Published By: Kaseya     Published Date: Nov 18, 2013
The BYOD trend is now mainstream and growing rapidly in acceptance. Gartner now estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.
Tags : 
kaseya, byod, technology trends byod, mobile, mobility, mdm, mobile device managment, it management, wireless
    
Kaseya
Published By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam, anti spyware, anti virus, application security, encryption, firewalls, intrusion detection, intrusion prevention
    
McAfee
Published By: NetApp     Published Date: Sep 24, 2014
41% of ESG research respondents reported that the cloud enabled them to realize IT cost reductions with 26% seeing improvements in productivity.  Learn how you can achieve these benefits by reviewing common IT scenarios detailed in private and hybrid cloud, data protection, BYOD and data movement use cases.
Tags : 
data center, cloud, cost efficient, cloud delivery model, it costs, productivity improvement, enterprise applications, data management
    
NetApp
Published By: NEC     Published Date: Nov 20, 2013
How to Support BYOD without Putting Your Company at Risk
Tags : 
nec, byod, bring your own device, daas, desktops as a service, it management
    
NEC
Published By: RingCentral     Published Date: Mar 20, 2015
Watch this video to learn why RingCentral Office is BYOD-friendly! RingCentral's powerful iOS and Android apps make it possible for your workforce to go mobile with the technology they know and love.
Tags : 
ringcentral, byod, ios, android, apps, mobile technolgy, it management, enterprise applications
    
RingCentral
Published By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief to ensure your organizations bring-your-own-device (BYOD) policy is a win-win situation.
Tags : 
enterprise mobile, byod, bring your own device, byod policy, byod strategy, mobility services, it management, mobile computing
    
Enterprise Mobile
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology, wifi, wireless phones, wlan, productivity
    
Avaya
Published By: TigerText     Published Date: Aug 30, 2015
Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.
Tags : 
tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management, hacker detection, identity management, security policies, smart phones, wireless messaging, wireless phones, wireless security, data protection, secure content management, mobile device management, data loss prevention, big data
    
TigerText
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing, laptops, communications, ip networks, ip telephony, network security, smart phones, wireless communications, wireless infrastructure, wireless phones, wireless security, collaboration, secure content management
    
TheMarketingScope
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
This free white paper Your PBX Is Killing Your Business: 5 Reasons Why You Should Ditch It for the Cloud explains 5 top reasons why businesses are leaving their PBXs behind and moving up to the cloud. Download the paper and learn: 5 measurable business benefits of moving communications to the cloud How to rapidly scale communications as your business adds new offices and countries Why mobility and BYOD are must-haves for modern business communications How cloud solutions deliver disaster recovery benefits that onsite PBXs simply can’t Extra Bonus: Two free checklists: Evaluating Cloud Communications Providers: 8 Questions to Ask 8 Signs Your Legacy PBX Is Putting Your Business at Risk Get all the facts when you download this free white paper!
Tags : 
cloud, pbx, communications, cloud solutions, byod
    
8x8 Inc.
Published By: Rapid7     Published Date: Nov 27, 2012
The "Bring Your Own Device" (BYOD) trend started in late 2009 and caught on with users faster than IT expected, especially as iOS and Android devices became dominant. This webinar will delve into the underlying risks associated with BYOD, and provide a simple step-by-step approach to mitigate their risks.
Tags : 
rapid7, technology, security, it management, business technology, access control, identity management, intrusion prevention
    
Rapid7
Published By: Sponsored by HP and Intel®     Published Date: Nov 14, 2012
The proliferation of mobile devices such as smart phones and tablets is transforming the way people collaborate and access information in many industries. Healthcare is no exception. Read on to learn about adoption of BYOD in the healthcare sector.
Tags : 
intel, byod, bring your own device, technology shift, healthcare, collaboration, data management, business technology, data center
    
Sponsored by HP and Intel®
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Windows-Anwendungen und -Desktops gehören zur Kernausstattung moderner Unternehmen, auch wenn mobile Plattformen, Smartphones und Tablets heute überall zu finden sind. Im Unterschied zu den Architekuren der mobilen Infrastruktur hat sich die Desktop-Infrastruktur seit vielen Jahren kaum weiterentwickelt. Aber jetzt ist der Zeitpunkt für die Desktop- Transformation gekommen.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms, business technology
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Con tecnología de VMware® Hoy, a pesar de la adopción masiva de plataformas móviles, teléfonos móviles y tabletas, los escritorios y aplicaciones de Windows son fundamentales para las empresas. Sin embargo, las arquitecturas de escritorio no han evolucionado con los años como lo hicieron las arquitecturas móviles. Ha llegado la hora de transformar los escritorios.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms, business technology
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Nov 12, 2015
avec VMware® Les postes de travail et applications Windows sont des éléments vitaux pour l’entreprise encore aujourd’hui, malgré l’adoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail n’ont pas su évoluer au fil des ans. L’heure de la transformation du poste de travail a sonné.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms, business technology
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms, business technology
    
VMware AirWatch
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.