maas360

Results 1 - 25 of 88Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : 
maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod, emm solution, mobility, it management, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
magic quadrant, enterprise mobility management, emm, mobility security, vendors, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
ibm, fiberlink, maas360, gartner, enterprise, mobile management, networking, wireless, enterprise applications, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
Tags : 
ibm, gartner, mobile, enterprise mobility, enterprise mobility management suites, wireless, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Sep 27, 2016
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Tags : 
ibm, maas360, mobile, security, mobile security, mobility, networking, wireless, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Feb 06, 2015
Download the Essential Capabilities for Secure Mobility for a high-level look at the over 300 guidelines in the DISA’s Mobile Device Management (MDM) Server Security Requirements Guide, and strategies to manage this ever expanding list.
Tags : 
nist, dod requirements, secure mobility, mdm, data communication, device authentication, it management, knowledge management, data management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security, networking, security, wireless, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management.
Tags : 
ibm, nist, dod, mobile, mobile device management, mdm
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
ibm, mobile, content management, mcm, aragon research, networking, software development, wireless, knowledge management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm, enterprise, emm, networking, security, wireless, enterprise applications, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : 
ibm, mobile, mobile applications, application lifecycle, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : 
maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile, emm, mobile management strategy, mobile device management, mdm, mobile device management solutions, application management, it management, enterprise applications
    
IBM MaaS360
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM MaaS360     Published Date: Apr 16, 2015
The Aragon Globe delivers an eighteen-vendor comparison on EMM strengths and weaknesses for mobile devices, content and BYOD readiness.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : 
fiberlink, deliverability, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : 
enterprise mobility management, emm, ovum, vendors, tablet, smartphone, mobile device, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
The Big Bang Theory – how Mobile Device Management exploded to include devices, apps and content
Tags : 
ibm, mobile, enterprise mobility management, mobile device management, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Sep 30, 2014
Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.
Tags : 
mobile device management, mobility, enterprise mobility, mobile security, application management, it management, knowledge management
    
IBM MaaS360
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee