Mobile Device Management White Papers

Results 1 - 25 of 254Sort Results By: Published Date | Title | Company Name
By: TigerText     Published Date: Aug 30, 2015

Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.

Tags : tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management, hacker detection
    
By: Silanis     Published Date: Aug 30, 2015

Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.

Tags : silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature
    
By: Google     Published Date: Aug 26, 2015

Noi di Google ci impegniamo a sostenere questa idea, e non siamo certamente i soli. Milioni di organizzazioni (imprese di piccole e grandi dimensioni, scuole ed enti governativi) hanno già iniziato ad adottare l'approccio "nel lavoro come nella vita".

Tags : work the way you live, mobile workers, smartphones, productive employees, engaging employees, remote access, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 11, 2015

This white paper reveals how CIOs are deploying an array of mobile content security technologies, giving them a robust platform upon which to build as their mobile usage expands.

Tags : mobility, mobile security, security technology, mobile for work, mobile, byod, cyod, endpoint
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect against advanced attacks.

Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
By: IBM     Published Date: Jul 09, 2015

This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.

Tags : application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile, enterprise applications
    
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
By: CDW     Published Date: Jul 08, 2015

It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.

Tags : security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management
    
By: CDW     Published Date: Jul 08, 2015

Addressing vulnerabilities in this growing risk environment.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
    
By: Google     Published Date: Jun 10, 2015

In this Google for Work perspective we explore the benefits of adopting the "work the way you live" mindset and the five principles of work the way you live.

Tags : work the way you live, mobile workers, smartphones, productive employees, engaging employees, remote access, mobile computing, mobile data systems
    
By: Google     Published Date: Jun 10, 2015

Que diriez-vous de rendre les employés aussi productifs au travail que dans leur vie de tous les jours?

Tags : work the way you live, mobile workers, smartphones, productive employees, engaging employees, mobile computing, mobile data systems, smart phones
    
By: Box     Published Date: May 28, 2015

This report illustrates how you can fast track your mobile and external collaboration initiatives.

Tags : sync, efss, mobility, track your mobile, security, cloud, hybrid, storage
    
By: Box     Published Date: May 11, 2015

This paper reveals the 6 essential elements of a mobile strategy.

Tags : mobility, modern mobility strategy, mobility strategy, box, mobile, mobile advantage, security, strategy for mobility
    
By: Box     Published Date: May 11, 2015

This paper provides information on mobile content management and evaluates 19 major MCM providers.

Tags : mobile content management, mcm, mcm providers, mobility, content management, cloud, mobile devices, security content
    
By: Dropbox for Business     Published Date: May 07, 2015

Discusses the importance of evaluating EFSS solutions through the lens of balancing usability and control.

Tags : usability, fss, enterprise, efss solutions, fss usage, employee adaption, mobile computing, application integration
    
By: Dropbox for Business     Published Date: May 07, 2015

Over the past year, Dropbox has released several sets of improvements to its Dropbox for Business product aimed at small business and team use.

Tags : enterprise, collaboration strategies, content management, content strategies, usability, enterprise applications, storage management, mobile computing
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Cisco     Published Date: Aug 27, 2015

Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best

Tags : cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans
    
By: SnapLogic     Published Date: Aug 17, 2015

This whitepaper addresses new elastic iPaaS requirements in detail while highlighting the importance of each.

Tags : elastic ipaas requirements, hybrid deployments, minimal lifecycle management, future-proofing, metadata-driven integration, error management, transactional support, pre-built connectivity
    
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: CDW     Published Date: Jun 30, 2015

See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.

Tags : mobility, apps, strategy, platform, emm, risk management, productivity, monitoring
    
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.