mobile device management

Results 26 - 50 of 365Sort Results By: Published Date | Title | Company Name
Published By: CCMI     Published Date: Jul 20, 2011
Telecom expense management is a critical and well-established discipline that has grown to encompass the challenging problem of mobile device and cost management. And now there's a simple, self-service approach to successful mobile expense management (MEM) that is simple to implement and demonstrates immediate results.
Tags : 
xigo, ccmi, mem, mobile expense management, voice report, telecom expense management, tem, mobile device management
    
CCMI
Published By: Oracle     Published Date: Jan 09, 2017
Basierend auf den Erkenntnissen unserer unabhängigen Forschungsstudie, Millennials und Hospitality: Die neue Definition von Service, erhalten Sie fünf Tipps, wie Sie erfolgreich das Geschäft dieser begehrten und technisch versierte Generation gewinnen und langfristig halten können.
Tags : 
mobility, mobile devices, millennials, hospitality, hotels, hotel management
    
Oracle
Published By: Oracle     Published Date: Jan 09, 2017
Based on the findings of our independent research study, "Millennials and Hospitality: The Redefinition of Service”, get our five tips to help you successfully win the business of this coveted, tech-savvy generation and keep them coming back.
Tags : 
mobility, mobile devices, millennials, hospitality, hotels, hotel management
    
Oracle
Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business
    
Dell
Published By: VMware AirWatch     Published Date: Jul 19, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware
Published By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, learn how to establish harmony between security and usability with the BlackBerry PlayBook OS 2.0. Get the answers to your most pressing questions and make BYOD a success for your enterprise.
Tags : 
mobile device management, mobile device, mobile communications, managing mobility, mobile management, mobile security, mobile usability
    
BlackBerry
Published By: Websense     Published Date: Aug 23, 2012
This mobile security white paper outlines the essential steps for mobile security.
Tags : 
mobile security, websense, mobile device management, mdm, malware
    
Websense
Published By: Jamf     Published Date: Nov 05, 2018
There are no signs of Apple device growth slowing down in the enterprise. In fact, 3 out of 4 employees now choose an iPhone or iPad for their mobile device. Our guideon the basics of device management will help you enhance iPhone, iPad and iOS management skills by providing you with: • An introduction to iPhone, iPad and iOS management • Explanation of Apple services and programs available • Outline of lifecycle management stages • Insight for infrastructure planning • Overview of the industry-leading Apple management solution
Tags : 
    
Jamf
Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
In this white paper, we uncover the numerous document productivity features that employees want across PCs and mobile devices.
Tags : 
mobile device management, byod
    
Adobe
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention
    
PC Mall
Published By: IBM MaaS360     Published Date: Feb 06, 2015
Download the Essential Capabilities for Secure Mobility for a high-level look at the over 300 guidelines in the DISA’s Mobile Device Management (MDM) Server Security Requirements Guide, and strategies to manage this ever expanding list.
Tags : 
nist, dod requirements, secure mobility, mdm, data communication, device authentication, it management, knowledge management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security, networking, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management.
Tags : 
ibm, nist, dod, mobile, mobile device management, mdm
    
IBM MaaS360
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: VMware AirWatch     Published Date: Sep 16, 2015
This report details the results of a survey taken from pre-qualified IT decision makers from North America and Europe, and shows how AirWatch by VMware received the highest scores for EMM vendor promise and fulfilment. 950 surveys were completed.
Tags : 
airwatch, vmware, emm, vendor promise, fulfillment, security, it management, business technology
    
VMware AirWatch
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee