maas360

Results 26 - 50 of 88Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, retail
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The paper explores why security is being left behind or completely out of app development.
Tags : 
mobile applications, security, app development, mobile application insecurity, software development, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : 
app management, app security, privacy, data passing, mobile app, networking, security, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Mobile productivity necessitates instant and easy access to retrieve, edit, share and send corporate data from anywhere. In this paper we’ll explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run all business from the palms of their hands.
Tags : 
mobile content management, mobile productivity, corporate data, access, workplace productivity, smartphones, tablets, networking, it management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.
Tags : 
enterprise mobility management, technology roadmap, mobile devices, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : 
byod, mobile devices, smartphone, tablet, networking, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : 
mobile device management, education, educators, students, app management, smartphone, tablet, classroom, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
magic quadrant, enterprise mobility management, emm, mobility security, vendors, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
enterprise mobile management, emm, ibm, vendors, mobile management strategy, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : 
enterprise mobility management, emm, ovum, vendors, tablet, smartphone, mobile device, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
google, google mobile os, android, hackers, security, emm, enterprise mobility management, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ios 8, apple, macintosh, security, information sharing, business process readiness, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development, data security, networking, security, software development, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy, networking, wireless, enterprise applications, data management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm, enterprise, emm, networking, security, wireless, enterprise applications, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise, security, networking, wireless, enterprise applications, data management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management, network, networking, security, wireless, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security, wireless, business technology
    
IBM MaaS360
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee