Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mobile devices

Results 176 - 200 of 916Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: CBRE     Published Date: Aug 02, 2017
Watch this on-demand Ask Us Anything HIMSS webinar as we engage with a panel of experts from St. Joseph Health, Box, and MobileIron. We'll uncover St. Joseph Health’s recent deployment of Box cloud storage with MobileIron to their employees’ mobile devices, major changes we’re seeing in the healthcare industry, and so much more!
Tags : 
webinar, cloud storage, healthcare, mobile devices, mobileiron
    
CBRE
Published By: CDW     Published Date: Nov 12, 2012
Whether assigned or brought in ad hoc by staff, mobile-computing devices require MDM to protect enterprise IT assets.
Tags : 
cdw, mdm, mobile device management, cross-platform, apple, ios
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed — securely.
Tags : 
consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios, android, access mobile applications, mobile device, mobile management, byod, wireless, network management, network performance management, productivity, mobileiron, cloud computing
    
CDW
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data, wireless
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Mobile devices are ubiquitous. The wide variety of functions they provide on the go — everything from making phone calls to checking email to literally millions of applications — has created widespread demand around the globe for this technology. With the right tools, an organization can extend the workplace far beyond its own physical walls. And employees can be active at any time within the 24-hour cycle; whenever inspiration strikes, a smartphone or tablet can quickly harness their productivity.
Tags : 
mobile, help desk, phone call, productivity, smartphone, tablet, email, applications, wireless, enterprise applications
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : 
wireless network, networking, applications, data, infrastructure, update, it management, wireless
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Apps have made mobile devices standard equipment for today’s workforce. And with the right strategy for selecting and customizing them, apps can change the way you work.
Tags : 
mobility, mobile workers, byod, productivity
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.
Tags : 
mobility, apps, strategy, platform, tmm, risk management, productivity
    
CDW
Published By: CDW     Published Date: Oct 01, 2015
Mobile devices and software deliver the capability for workers to remain productive in new ways and places.
Tags : 
analytics software, application management, application performance, application security, cdw (cdw), cloud applications
    
CDW
Published By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : 
cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development, it management
    
CDW
Published By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : 
cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement, networking, security, software development, it management, wireless
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: CDW     Published Date: Jun 14, 2016
Mobile devices and apps have transformed the way enterprises operate in recent years, improving productivity, communication and collaboration, and in many cases completely changing how work gets done. To help optimize mobility initiatives, many organizations turn to trusted IT partners that can help maintain mobile deployments and free up staff to focus on innovation.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
CDW
Published By: CDW     Published Date: Jun 14, 2016
For most organizations, the question of whether to deploy mobile computing has long since given way to the question of how. And many are only in the early stages of mobility maturity. An expertly conceived strategy is necessary to achieve the innovation that mobility can provide.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
CDW
Published By: CDW     Published Date: Dec 03, 2012
The fact is that IT may be in the dark about who is using mobile devices to access company data.
Tags : 
mobile device management, cdw, mobile, wireless, telecom
    
CDW
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise, email, devices, apps, it management
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data center
    
CDW Symantec
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices, networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
CDW-Trend Micro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.