Mobile Device Management White Papers

Results 1 - 25 of 269Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security, data protection, business technology, mobile device management
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control, email security, hacker detection, mobile workers, smart phones, wireless security, data protection, desktop management, cloud computing, business technology, mobile device management
    
By: Fujitsu     Published Date: Sep 02, 2016

Download this white paper today to better understand how devices are going to be used in the health care environments and how you can adjust your product plans accordingly.

Tags : fujitsu, mobile device, healthcare device, mobile computing, tablets, smartphones, mobile workers, remote access, application integration, data protection, collaboration, mobile device management
    
By: AVI-SPL     Published Date: Sep 01, 2016

Is your business struggling with tight budgets and an overwhelmed IT department? If yes, you need to preserve existing investments and increase responsiveness in today’s fast-paced digital economy.

Tags : collaboration, cloud collaboration, byod, conference room, video conferencing, web collaboration, infrastructure, ip telephony, remote access, mobile data systems, wireless infrastructure, cloud computing, business technology, mobile device management
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls, hacker detection, data protection, mobile device management, data loss prevention
    
By: Kaspersky     Published Date: Jul 22, 2016

Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?

Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones, wireless messaging, wireless security, data protection, collaboration, messaging, data loss prevention
    
By: MobileIron     Published Date: May 23, 2016

Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.

Tags : security, mobile device, windows, best practices, streaming, device management, identity management, security management, business intelligence, database security, mobile device management
    
By: MobileIron     Published Date: May 23, 2016

Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415

Tags : security, mobileiron, best practices, windows, device management, identity management, security management, mobile computing, wireless phones, wireless security, mobile device management
    
By: F5     Published Date: May 12, 2016

App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.

Tags : application protection, app protection, security, cloud, cloud computing, public cloud, security application, application security, virtualization, infrastructure, mobile device management
    
By: F5     Published Date: May 12, 2016

This white paper reveals the results of implementing F5 were it provided intelligent and agile Infrastructure, highly available and secure application services and manage applications in the hybrid environment.

Tags : it infrastructure, infrastructure, security, application security management, security application, application security, internet security, security management, virtualization, cloud computing, mobile device management
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control, encryption, hacker detection, intrusion prevention, wireless security, data protection, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?

Tags : data security, data management, mobile security, application security, vulnerability management, mobile marketing, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?

Tags : enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

In this white paper, we uncover the numerous document productivity features that employees want across PCs and mobile devices.

Tags : mobile device management, byod, employee performance, service management
    
By: Adobe     Published Date: Apr 25, 2016

Diese Entwicklung lässt sich zwar mit Statistiken (siehe Seitenleiste) belegen, am deutlichsten zeigt sie sich jedoch im täglichen Leben. Sei es der Jogger, der sein Laufpensum mit dem Telefon überprüft, die Mutter, die sich mit ihren Kindern den Nachthimmel über eine Astronomie-App auf dem Tablet ansieht, der Hauseigentümer, der mithilfe einer Zeitschriften-App in der Lage ist, selbst eine Reparatur durchzuführen, oder jeder Kunde, der sich sein Getränk an einem „Coke Freestyle“-Automaten zusammenstellt oder seinen morgendlichen Kaffee über die Starbucks-App bestellt. Die Liste ließe sich beliebig fortführen.

Tags : mobile lifecycle, mobile device management, mobile marketing
    
By: Adobe     Published Date: Apr 25, 2016

This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?

Tags : data security, data management, mobile security, application security, vulnerability management, mobile marketing, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?

Tags : enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

In this white paper, we uncover the numerous document productivity features that employees want across PCs and mobile devices.

Tags : mobile device management, byod, employee monitoring software, employee training software
    
By: Adobe     Published Date: Apr 25, 2016

Bei DAM geht es nicht nur um Speicher. DAM ist eine strategische Grundvoraussetzung für die digitale Transformation.

Tags : digital asset management, marketing, mobile marketing, mobile device management
    
By: Adobe     Published Date: Apr 22, 2016

This white paper uncovers the numerous document productivity features that employees want across PCs and mobile devices.

Tags : mobility, mobile devices, cloud, cloud-based, cloud-based productivity apps, enterprise, enterprise productivity, productivity apps, security, application security, smart phones, virtualization, cloud computing, mobile device management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management, mobile application management, mobile content management and more

Tags : citrix, xenmobile, mobile, security, mobile device management, mobile app management, mobile content management, secure instant messaging, wireless infrastructure, wireless messaging, wireless phones, wireless security, collaboration, messaging, secure content management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.

Tags : citrix, byod, strategy, mobile, mdm, mobile app management, emm, mobility, infrastructure, ip networks, ip telephony, hacker detection, internet security, security management, security policies, risk management, data protection, collaboration, messaging, mobile device management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

"This report details Forrester’s findings about how well each vendor fulfills their criteria and where they stand in relation to each other to help infrastructure and operations professionals select the right partner for their enterprise mobile management.

Tags : citrix, enterprise, mobile, management, forrester, customer satisfaction, customer experience management, secure content management, mobile device management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : citrix, security, enterprise, mobility, mobile computing, mobile workers, wireless infrastructure, it spending, risk management, data protection, messaging, mobile device management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.