Mobile Device Management White Papers

Results 1 - 25 of 212Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Apr 15, 2015

IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
By: IBM     Published Date: Apr 15, 2015

With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.

Tags : ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric, mobile data systems, mobile workers
    
By: IBM     Published Date: Apr 09, 2015

How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.

Tags : application integration, mobile apps, coding, cloud-based services, cloud computing, automation, user feedback, mobile computing
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper reveals how important is effective security software for banking threats.

Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks, access control, anti spyware, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.

Tags : security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.

Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
By: LogMeIn     Published Date: Jul 18, 2014

A Nucleus Research guidebook to LogMeIn Rescue

Tags : logmein rescue, rescue guidebook, saas, management tools, remote control, network management, mobile computing, customer relationship management
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.

Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: destinationCRM.com     Published Date: Apr 15, 2015

It's no secret that the use smart phones is exploding. According to a recent report from the Pew Research Center, 34% Americans go online mostly using their phones, and not using some other device such as a desktop or laptop computer. The implication for location based marketing and ecommerce, customer service, and personalized, permission based marketing is enormous, but the rules of engagement are markedly different for mobile communications.

Tags : mobile data, customer engagement, crm, customer data, smartphones, mobile communications, mobile data systems, smart phones
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: IBM     Published Date: Apr 09, 2015

IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.

Tags : ibm, security, risk management, mobile device security, network security appliance, security management, vulnerability management, mobile device management
    
By: Riverbed     Published Date: Feb 26, 2015

The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.

Tags : network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device, network management, network performance
    
By: McAfee     Published Date: Feb 25, 2015

This white paper articulates the business benefits derived by companies that have deployed NGFW.

Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall, anti spam
    
By: CDW     Published Date: Feb 24, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the EU e-signature law and the benefits of knowing about this law for the business.

Tags : esignature law, electronic signature technology laws, eu esignature law, docusign, identifying the signer, identification signer, authentication, identity management
    
By: Avaya     Published Date: Feb 06, 2015

This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.

Tags : collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.