Sort results by: Published date | Company name

3Com Solutions: Mitigating the ""Big Three"" Risk Factors in Wireless Deployment [ Source: 3Com ]
January 2008- Positioning a wireless network can be risky business without attention to three major risk factors: rogue devices, security, and return on investment. For many IT managers, unless they can be assured that they have the same level of control and security as their wired LANs, deploying wireless technology can feel like they are factually tossing their tightly managed network into the air. This paper explores the expertise and tests that can be applied to recognize ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Overview of Mobile Communications [ Source: ADT ]
January 2008- The key attribute of cellular telephony is mobility - the subscriber can be on the move while communication is taking place. Mobility is extended to include the ability to ""Roam"" from coverage area to coverage area. Every registered user has a profile stored in a Home Location Register (HLR) located within the mobile switch in their home MTSO. As the user roams, the cellular phone notifies the roaming location’s network what its ID and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Mobile Payments In Retail [ Source: Aberdeen Group ]
September 2008- Our research will show that in the initial stages of the mobile contactless lifecycle, a high degree of flexibility and customer responsiveness will be required from the mobile contactless ecosystem companies, including mobile carriers, solution providers, integrators, issuers, and credit associations. This report details and breaks down these necessary processes (front end and back end) as well as the software and hardware applications required for the successful deployment and functioning of this payment form factor.

[RESEARCH/ANALYST REPORT]
Read Abstract | Go to Research/Analyst Report

Mobile Device's Everywhere: Healthcare Organizations Need Innovative Technology to Manage - Secure Mobility [ Source: Absolute Software ]
April 2012- To successfully support the use of mobile devices in an increasingly digital environment, healthcare organizations must begin to develop IT management and security initiatives that address compliance with regulations, security of electronic personal health information, and overall cost-effectiveness.

[WHITE PAPER]
Read Abstract | Go to White Paper

Reduce the Risk - and Cost - of Mobility by Securely Managing Your Mobile Devices [ Source: Absolute Software ]
April 2012- The proper use of technology will allow you to save money, protect existing assets, and even discover additional sources of revenue.

[WHITE PAPER]
Read Abstract | Go to White Paper

IT Infrastructure Monitoring Strategies for the BYOD World [ Source: AccelOps, Inc. ]
November 2012- Companies are increasingly loosening policies to allow employee-owned devices to connect to corporate resources. More than 75% of the knowledge-based workforce uses a mobile device to access the corporate network. The typical knowledge worker now averages 2.8 devices that may connect to the network. AccelOps makes this a no-compromise decision.

[WHITE PAPER]
Read Abstract | Go to White Paper

Best Practices for Secure Enterprise Content Mobility [ Source: Accellion ]
September 2012- The proliferation of mobile devices and the popularity of Bring Your Own Device (BYOD) are creating new security challenges for enterprises. Employees are using devices such as iPads and smartphones to access and store business data. And they're relying on email and consumer-grade file-sharing services to share and access this data. As a result, enterprise data has never been easier to access and more difficult to secure.

To secure mobile devices while enabling ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Secure File Sharing and Collaboration in the Cloud: Maximizing the Benefits While Minimizing the Risks [ Source: Accellion ]
September 2012- The rampant use of free, cloud-based dropbox-type of applications has created new security vulnerabilities for enterprise organizations. Employees using mobile devices are increasingly taking advantage of these services to share confidential or protected information and collaborate with people outside the organization-without providing adequate security, tracking, or visibility for the IT department.

Employee use of unmanaged cloud-based services puts your organization at risk for a data breach or non-compliance with industry and government regulations.<...

[WHITE PAPER]
Read Abstract | Go to White Paper

Putting IT Back in Control of BYOD [ Source: Accellion ]
September 2012- Osterman Research conducted a survey of 760 individuals with regard to the BYOD issues they face in their organizations. Personally owned Apple iPhone and iPads, as well as Android smartphones and tablets, are more common than their company-supplied counterparts.

The research also found widespread use of third party, cloud-based storage and file synchronization offerings that are sometimes used with IT's blessing, but more often not. Dropbox, for example, is used in 14% of 1,000+ employee organizations ...

[WHITE PAPER]
Read Abstract | Go to White Paper

The Need for Enterprise-Grade File Sharing and Synchronization [ Source: Accellion ]
September 2012- Cloud-based file-sharing and synchronization solutions are among the most popular applications used in the workplace.

Many of these solutions, classified as "consumer-focused" because they are typically deployed by individual users and not as part of a coordinated IT plan, offer tremendous usability. By synchronizing files across a variety of platforms-desktop, laptop, smartphone and tablet-these tools enable users to have near real time access to all of their content from any platform and any ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All