Mobile Device Management White Papers

Results 1 - 25 of 179Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: CA Technologies     Published Date: Jul 16, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: EMC     Published Date: Dec 18, 2014

This Case Study provides information on how EMC VNX unified storage increases performance by three times and reduces costs by 90 percent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business intelligence, telecom, infrastructure
    
By: EMC     Published Date: Dec 18, 2014

This Case Study provides information on how EMC VNX unified storage increases performance by three times and reduces costs by 90 percent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business intelligence, telecom, infrastructure
    
By: EMC     Published Date: Dec 18, 2014

This Case Study provides information on how EMC VNX unified storage increases performance by three times and reduces costs by 90 percent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business integration, telecom, infrastructure
    
By: EMC     Published Date: Dec 18, 2014

This Case Study provides information on how EMC VNX unified storage increases performance by three times and reduces costs by 90 percent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business integration, telecom, infrastructure
    
By: EMC     Published Date: Dec 18, 2014

This Case Study provides information on how EMC VNX unified storage increases performance by three times and reduces costs by 90 percent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business integration, telecom, infrastructure
    
By: EMC     Published Date: Dec 16, 2014

This Case Study provides information on how EMC VNX unified storage increases performance by three times and reduces costs by 90 percent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business integration, telecom, infrastructure
    
By: EMC     Published Date: Dec 16, 2014

EMC VNX multiplie les performances par trois et réduit les coûts de 90 %.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business intelligence, telecom, infrastructure
    
By: EMC     Published Date: Dec 16, 2014

EMC VNX sorgt für dreifache Steigerung der Performance und Reduzierung der Kosten um 90 Prozent.

Tags : emc vnx unified storage, storage, virtualization, mobile services, storage virtualization, business intelligence, telecom, infrastructure
    
By: Samsung     Published Date: Dec 11, 2014

This White Paper explores how the proliferation of smartphones and tablets (the global installed base of smartphones alone is set to hit 3 billion devices by 2017) has led consumers to adopt new behaviours, and develop expectations around what experiences mobile computing can offer.

Tags : mobile computing, cloud computing, network performance, security management, mobile workers, smart phones, database security, content integration
    
By: Comview     Published Date: Dec 10, 2014

Download this white paper, and uncover the steps this HIT team took to manage their IT and telecommunications portfolio, translating to millions in savings on their operations budget! Discover the hidden costs of your organization’s technologies, and their massive impact on the annual IT and telecom budget.

Tags : comview, telecom management, telecom expense management, healthcare telecom, it budget, telecom budget, internetworking hardware, ip networks
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

The top ten tips on how to secure your business against cyber risk and threats.

Tags : tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: ClickSoftware     Published Date: Nov 17, 2014

From calculator watches to smart glasses, this paper will guide you through the evolution of wearable technology and its impact on the service industry. This whitepaper will help you to understand how your business can benefit by getting ahead of the trend through implementing wearable technology within your organisation.

Tags : shift scheduling, wearable technology, the evolution of wearable technology, byow, it management, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Nov 09, 2014

Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.

Tags : box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage, remote access
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.