Mobile Device Management White Papers

Results 1 - 25 of 234Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
By: IBM     Published Date: Jun 16, 2015

This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

Tags : data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures
    
By: IBM     Published Date: Jun 16, 2015

An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.

Tags : enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies
    
By: TigerText     Published Date: Jun 11, 2015

Download this guideline for reinforcing existing BYOD security practices and discover how mobile health can minimize expenses, improve patient care and boost staff productivity.

Tags : tigertext, mobile security, wireless security, mobile devices, mobile workers, byod, smart phones, data protection
    
By: Kaseya     Published Date: May 13, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, disaster recovery
    
By: Dropbox for Business     Published Date: May 07, 2015

Discusses the importance of evaluating EFSS solutions through the lens of balancing usability and control.

Tags : usability, fss, enterprise, efss solutions, fss usage, employee adaption, mobile computing, application integration
    
By: Dropbox for Business     Published Date: May 07, 2015

Over the past year, Dropbox has released several sets of improvements to its Dropbox for Business product aimed at small business and team use.

Tags : enterprise, collaboration strategies, content management, content strategies, usability, enterprise applications, storage management, mobile computing
    
By: Citrix Systems     Published Date: Apr 15, 2015

IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
By: IBM     Published Date: Apr 15, 2015

With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.

Tags : ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric, mobile data systems, mobile workers
    
By: CDW     Published Date: Jun 30, 2015

See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.

Tags : mobility, apps, strategy, platform, emm, risk management, productivity, monitoring
    
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Cisco     Published Date: Jun 10, 2015

This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, access control, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 10, 2015

Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.

Tags : wifi, wireless, technology, network, application, infrastructure, mobile computing, mobile data systems
    
By: Box     Published Date: May 28, 2015

This report illustrates how you can fast track your mobile and external collaboration initiatives.

Tags : sync, efss, mobility, track your mobile, security, cloud, hybrid, storage
    
By: Acronis EMEA     Published Date: May 19, 2015

Download this paper to uncover the steps needed to mobilise your workforce and become more productive.

Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
    
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
    
By: Acronis EMEA     Published Date: May 19, 2015

This case study explores how Acronis Access changed the way Parrish Construction Group communicates.

Tags : build a mobile workforce, control access, share documents, security, acronis access solution, acronis, access to documents, mobility
    
By: IBM     Published Date: May 18, 2015

How do you, as a practitioner, address the siloes involved in modern enterprise development and leverage DevOps to make your job easier?

Tags : devops, enterprise development, software delivery cycle, software integration, software deployment, multi-platform applications, cloud integration, mobility
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this datasheet to discover the main benefits of Acronis Access Advanced.

Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
    
By: Aerohive     Published Date: May 14, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, virtualization, cloud computing
    
By: Aerohive     Published Date: May 14, 2015

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: May 14, 2015

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: May 14, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, virtualization, cloud computing
    
By: Aerohive     Published Date: May 14, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, virtualization, cloud computing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.