Mobile Device Management White Papers

Results 1 - 25 of 112Sort Results By: Published Date | Title | Company Name
By: LogMeIn     Published Date: Jul 18, 2014

A Nucleus Research guidebook to LogMeIn Rescue

Tags : logmein rescue, rescue guidebook, saas, management tools, remote control, network management, mobile computing, customer relationship management
    
By: Riverbed     Published Date: Jul 18, 2014

Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!

Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration, remote access, mobile computing, mobile workers
    
By: CA Technologies     Published Date: Jul 16, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: HP     Published Date: Jul 03, 2014

A Viewpoint paper on how managed cloud-based options balance control with flexibility and scale.

Tags : enterprise mobility, security and governance, cloud-based mobility services, web service security, mobile computing, mobile data systems, mobile workers, vulnerability management
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Box     Published Date: Mar 13, 2014

This recorded webinar discusses the latest challenges with BYOD (Bring Your Own Device) faced by today's organizations and recommendations on how to move forward with a BYOD workforce.

Tags : box, byod, mobile devices, iphone, android, mobile workers, mobile workforce, remote management
    
By: Citrix     Published Date: Mar 11, 2014

Empowering people to use Windows applications and native mobile apps on any type of device—with full security

Tags : citrix, xenapp, mobile applications, enterprise applications, windows applications, windows, mobile device, remote access
    
By: Kaspersky     Published Date: Feb 14, 2014

You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world.

Tags : byod, kaspersky, mobile security, wireless security, mobile, smartphone, iphone, blackberry
    
By: Kaspersky     Published Date: Feb 14, 2014

Read this white paper to learn just how increasingly complex technology is causing new security challenges, and how best to address them.

Tags : it security, security, cybersecurity, antivirus, virus, antispam, spam, email security
    
By: Citrix     Published Date: Nov 04, 2013

Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.

Tags : citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access, remote network management
    
By: Citrix     Published Date: Oct 15, 2013

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
By: Citrix     Published Date: Sep 17, 2013

Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Download here to learn about XenClient, an innovative, clientside alternative for delivering virtual desktops, which allows IT to extend the benefits of desktop virtualization to laptop users whether they are working online or offline.

Tags : remote access, access control, mobile computing, mobile workers, messaging, virtualization, mobile device management
    
By: Citrix     Published Date: Apr 15, 2013

The ability to take Windows applications and desktops mobile has many advantages, but the variation in mobile device types, including form factor and platform, makes the process of identifying a single solution to address all the employees’ requirements complex. This paper discusses how Citrix can help take Windows mobile on any device.

Tags : citrix, windows, mobile device, mobile workers, microsoft, smartphones, iphone, device
    
By: Citrix     Published Date: Aug 15, 2012

Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.

Tags : citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices
    
By: CA Technologies     Published Date: Jul 30, 2014

Join us on July 30th at 10am PT, the panelists will examine the current state of enterprise mobility programs and outline concrete steps and examples that businesses can take to reboot their own mobility efforts.

Tags : ca technologies, emm, enterprise mobility management, mobile workers, mobile devices, byod, enteprise mobility, remote access
    
By: HP     Published Date: Jul 03, 2014

In this newsletter, we share our thoughts on the mobility-led opportunities that have emerged and look at the issues that have to be addressed if we are to adapt successfully to the new world order.

Tags : mobility, the evolution of technology, mobility lead opportunities, mobile computing, mobile data systems, mobile workers, mobile device management
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Absolute Software     Published Date: May 14, 2014

Three simple steps to legally secure and manage employee-owned devices within a corporate environment

Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management
    
By: Absolute Software     Published Date: May 14, 2014

Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.

Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device, access control, application security, email security
    
By: Citrix     Published Date: May 08, 2014

A report into the need for datacenter security and how Citrix NetScaler is the solution.

Tags : datacenter security, netscaler, citrix, defense, access control, application security, ddos, internet security
    
By: Citrix     Published Date: May 08, 2014

A report into the marked insurgence of denial of service (DoS) attacks and the benefits of Citrix NetScaler in the defense of these attacks.

Tags : denial of service, dos, adc, defence, security, citrix, netscaler, access control
    
Start   Previous   1 2 3 4 5    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.