enterprise mobile

Results 1 - 25 of 516Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 21, 2017
Mobile devices are ubiquitous, and many organizations have realized that consumer-facing mobile apps can drive deep connections and loyalty with their customers.
Tags : 
    
Adobe
Published By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building todayís modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIronís enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: Lookout     Published Date: Mar 29, 2017
As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success.
Tags : 
future, enterprise, mobile security, predictions, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
practitioners, enterprise, mobile security, productivity, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
idg, mobile workforce, analysis, technology, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Over the past year, Gartner has provided important observations and guidance on Enterprise Mobility Management (EMM) and mobile security solutions. Read the report for key insights into the differences between the two as well as to better understand current state of mobile threat defense.
Tags : 
gartner, market, insights, mobile threat, emm, lookout
    
Lookout
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Code42     Published Date: Mar 31, 2017
Todayís enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, youíre expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. Itís the new reality ó and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and theyíre no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers arenít limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. Itís an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. Itís an established reality reshaping the enterprise. This white paper is the third in a three-part series on enabling the mobile enterprise while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. Itís fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while theyíre on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, weíre finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in todayís IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
    
HPE Intel
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. Itís often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a companyís most valuable data even while itís potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Cisco     Published Date: Dec 04, 2015
See how IT and business leaders can work together to develop a winning mobility strategy.
Tags : 
cisco, enterprise, mobility, mobile strategy, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
This Technology Spotlight examines the role of digital transformation in customer engagement and omni-channel retail. It also looks at the role of Cisco's enterprise networking solution portfolio, particularly Connected Mobile Experiences (CMX) and Intelligent WAN (IWAN), in the strategically important omni-channel retail market.
Tags : 
enterprise network, digital management, customer engagement, wireless
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
This Technology Spotlight examines the role of digital transformation in customer engagement and omni-channel retail. It also looks at the role of Cisco's enterprise networking solution portfolio, particularly Connected Mobile Experiences (CMX) and Intelligent WAN (IWAN), in the strategically important omni-channel retail market.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
This Technology Spotlight examines the role of digital transformation in customer engagement and omni-channel retail. It also looks at the role of Cisco's enterprise networking solution portfolio, particularly Connected Mobile Experiences (CMX) and Intelligent WAN (IWAN), in the strategically important omni-channel retail market.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 18, 2015
This paper illustrates how organisations are becoming digital enterprises due to the technology implications of scale and volume.
Tags : 
technology, digital economy, network, become a digital enterprise, mobile, social, cloud, big data
    
Equinix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.