Mobile Device Management White Papers

Results 1 - 25 of 120Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
By: Citrix     Published Date: Jul 25, 2014

Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.

Tags : enterprise, mobility, challenge, data, windows, datacenter, web, solution
    
By: Citrix     Published Date: Jul 25, 2014

Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.

Tags : enterprise information, secure, android, apple ios, microsoft window tablets, flexibility, mobile workers, smart phones
    
By: Citrix     Published Date: Jul 25, 2014

Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.

Tags : email, mobile, collaboration, smartphone, tablets, productivity, access control, mobile workers
    
By: Citrix     Published Date: Jul 25, 2014

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : secure, mobility, management, checklist, mobile computing, wireless infrastructure, wireless security, mobile device management
    
By: Citrix     Published Date: Jul 25, 2014

According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.

Tags : enterprise mobile, executive checklist, security, byod, network security, mobile workers, smart phones, it spending
    
By: Citrix     Published Date: Jul 25, 2014

Discover how to select technologies and develop policies for your BYOD program.

Tags : boyd, simple, secure, technologies, wireless infrastructure, wireless security, best practices, collaboration
    
By: Riverbed     Published Date: Jul 18, 2014

Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!

Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration, remote access, mobile computing, mobile workers
    
By: CA Technologies     Published Date: Jul 16, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: HP     Published Date: Jul 03, 2014

A Viewpoint paper on how managed cloud-based options balance control with flexibility and scale.

Tags : enterprise mobility, security and governance, cloud-based mobility services, web service security, mobile computing, mobile data systems, mobile workers, vulnerability management
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Citrix     Published Date: Mar 11, 2014

Empowering people to use Windows applications and native mobile apps on any type of device—with full security

Tags : citrix, xenapp, mobile applications, enterprise applications, windows applications, windows, mobile device, remote access
    
By: IBM     Published Date: Feb 27, 2014

This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.

Tags : ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization
    
By: Kaspersky     Published Date: Feb 14, 2014

You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world.

Tags : byod, kaspersky, mobile security, wireless security, mobile, smartphone, iphone, blackberry
    
By: Kaspersky     Published Date: Feb 14, 2014

Read this white paper to learn just how increasingly complex technology is causing new security challenges, and how best to address them.

Tags : it security, security, cybersecurity, antivirus, virus, antispam, spam, email security
    
By: Citrix     Published Date: Nov 04, 2013

Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.

Tags : citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access, remote network management
    
By: Citrix     Published Date: Oct 15, 2013

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
By: Citrix     Published Date: Sep 17, 2013

Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Download here to learn about XenClient, an innovative, clientside alternative for delivering virtual desktops, which allows IT to extend the benefits of desktop virtualization to laptop users whether they are working online or offline.

Tags : remote access, access control, mobile computing, mobile workers, messaging, virtualization, mobile device management
    
By: Citrix     Published Date: Apr 15, 2013

The ability to take Windows applications and desktops mobile has many advantages, but the variation in mobile device types, including form factor and platform, makes the process of identifying a single solution to address all the employees’ requirements complex. This paper discusses how Citrix can help take Windows mobile on any device.

Tags : citrix, windows, mobile device, mobile workers, microsoft, smartphones, iphone, device
    
By: Citrix     Published Date: Aug 15, 2012

Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.

Tags : citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices
    
By: LogMeIn     Published Date: Jul 18, 2014

A Nucleus Research guidebook to LogMeIn Rescue

Tags : logmein rescue, rescue guidebook, saas, management tools, remote control, network management, mobile computing, customer relationship management
    
By: HP     Published Date: Jul 03, 2014

In this newsletter, we share our thoughts on the mobility-led opportunities that have emerged and look at the issues that have to be addressed if we are to adapt successfully to the new world order.

Tags : mobility, the evolution of technology, mobility lead opportunities, mobile computing, mobile data systems, mobile workers, mobile device management
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
Start   Previous   1 2 3 4 5    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.