Mobile Device Management White Papers

Results 1 - 25 of 244Sort Results By: Published Date | Title | Company Name
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
By: IBM     Published Date: Jul 09, 2015

This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.

Tags : application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile, enterprise applications
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
By: CDW     Published Date: Jul 08, 2015

It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.

Tags : security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management
By: CDW     Published Date: Jul 08, 2015

Addressing vulnerabilities in this growing risk environment.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
By: CDW     Published Date: Jun 30, 2015

See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.

Tags : mobility, apps, strategy, platform, emm, risk management, productivity, monitoring
By: Dropbox for Business     Published Date: May 07, 2015

Discusses the importance of evaluating EFSS solutions through the lens of balancing usability and control.

Tags : usability, fss, enterprise, efss solutions, fss usage, employee adaption, mobile computing, application integration
By: Dropbox for Business     Published Date: May 07, 2015

Over the past year, Dropbox has released several sets of improvements to its Dropbox for Business product aimed at small business and team use.

Tags : enterprise, collaboration strategies, content management, content strategies, usability, enterprise applications, storage management, mobile computing
By: LogMeIn     Published Date: Jul 18, 2014

A Nucleus Research guidebook to LogMeIn Rescue

Tags : logmein rescue, rescue guidebook, saas, management tools, remote control, network management, mobile computing, customer relationship management
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
By: IBM     Published Date: Jun 16, 2015

This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

Tags : data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures
By: IBM     Published Date: Jun 16, 2015

An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.

Tags : enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies
By: TigerText     Published Date: Jun 11, 2015

Download this guideline for reinforcing existing BYOD security practices and discover how mobile health can minimize expenses, improve patient care and boost staff productivity.

Tags : tigertext, mobile security, wireless security, mobile devices, mobile workers, byod, smart phones, data protection
By: Cisco     Published Date: Jun 10, 2015

This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, access control, anti spam, anti spyware
By: Cisco     Published Date: Jun 10, 2015

Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.

Tags : wifi, wireless, technology, network, application, infrastructure, mobile computing, mobile data systems
By: Box     Published Date: May 28, 2015

This report illustrates how you can fast track your mobile and external collaboration initiatives.

Tags : sync, efss, mobility, track your mobile, security, cloud, hybrid, storage
By: Acronis EMEA     Published Date: May 19, 2015

Download this paper to uncover the steps needed to mobilise your workforce and become more productive.

Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
By: Acronis EMEA     Published Date: May 19, 2015

This case study explores how Acronis Access changed the way Parrish Construction Group communicates.

Tags : build a mobile workforce, control access, share documents, security, acronis access solution, acronis, access to documents, mobility
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.