Sort results by: Published date | Company name
Showing items 1-25

Mobile Workflows that Enhance Productivity: 8 Use Cases [ Source: Good Technology ]

February 2015- Financial Services companies everywhere are moving beyond the basics of mobility to deliver sophisticated mobile workflows that connect employees with each other, their partners and their customers. Read this paper to see eight secure mobile workflow use cases being used by organizations of various industries that enhance productivity.

The Fastest Most Secure Path to Mobile Productivity [ Source: Citrix ]

January 2015- The BYOD phenomenon is here to stay. To keep people happy and productive and to meet stringent data security and compliance requirements, you need a plan. Most organizations turn first to enterprise mobile device management (MDM) platforms. Learn how MDM solutions are powerful tools for any BYOD arsenal.

Secure application delivery for a mobile workforce [ Source: Citrix ]

January 2015- This whitepaper explores a way to transform your organization by empowering people to use any application on any type of device, with full security. Providing a complete mobile workspace solution, Citrix Workspace Suite lets IT support any device people choose -- corporate-owned or personal -- as well as the applications and data they use.

Securing the Mobile App Market [ Source: Symantec ]

January 2015- The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike. Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code - and their customers - with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile ...

Overcoming Security Woes to Expand Mobile Adoption [ Source: VMware / Carahsoft ]

December 2014- By recasting mobile devices as simple points of access to applications and data, agencies can reduce risks and control costs. Read this paper to learn more.

The Anywhere, Anytime College Experience [ Source: VMware / Carahsoft ]

November 2014- As technology advances and students remain on the cutting edge, colleges and universities have no choice but to keep up. While the changes in culture, strategy, and technology take some adjustment, the advances also ultimately benefit the institutions and their staff by improving efficiency, enhancing security, and bolstering management capabilities.

Mobile Security: Confidence Ebbs as BYOD Booms [ Source: Dell/Microsoft ]

November 2014- Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization's data in ...

Tablet Management Simplified [ Source: Dell/Microsoft ]

November 2014- Tablets first became popular as media devices for consumers and then began to invade workplaces with bring-your-own-device (BYOD) policies in place. Now, a growing number of businesses are not only supporting employee-owned tablets, they're also purchasing tablets, particularly Windows tablets, for employee use. Read now and learn how systems management and deployment appliances can make enterprise tablet support easier, reduce costs, enhance security, and free staff to concentrate on strategic projects.

5 Best Practices for Managing and Securing Enterprise Tablets [ Source: Dell/Microsoft ]

November 2014- Following some best practices can help your organization craft a tablet strategy that meets your short-term and long-term needs. Doing so enables companies to take advantage of the productivity and other benefits that tablets offer without overburdening IT.

Read now and learn why these five steps are critical to creating a tablet strategy:
- Identifying Needs and Goals
- Establishing Mobility Policies
- Selecting a Flexible Mobility Management Solution

IAM for the Real World: Mobility [ Source: Dell ]

October 2014- Mobile technologies and bring-your-own-device standards are becoming the norm at every business. But managing identity and access for mobile devices doesn't have to be difficult.

In this e-book, discover:

• How to ensure IAM for mobile technology is easy
• The key governance factors involved with the cloud and BYOD
• Why data and identity management is crucial

Learn to easily manage identity governance, even in a ...

Empowering Your Mobile Workers - 4 Criteria for Secure Collaboration [ Source: Box ]

October 2014- Download this whitepaper to learn how to build a mature mobile strategy and the top 4 criteria for secure collaboration. Today's most productive employees are not tied to a desk, an office, or a location. These top producers are experts at finding new tools, new apps, and new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with ...

Mobility: Business Executive VS. IT - Who Holds The Wallet? [ Source: AT&T ]

June 2014- Whether they're consciously avoiding IT or not, line-of-business managers and C-level executives are becoming more comfortable with making their own technology decisions. In fact, many believe they can make such decisions better and faster than IT. But as strategy and purchasing decisions are being made for business-critical technologies, such as mobile computing, it's important to analyze how organizations are transforming their evaluation, buying, and building processes to maintain a competitive advantage. Who currently holds the ...

How CIOs Can Guide the Enterprise to Mobile Success [ Source: OpenMarket ]

June 2014- In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls.

The Business Case for Mobile Security and Management Solutions [ Source: AT&T ]

March 2014- Organizations that have not developed an effective mobile empowerment and management strategy risk falling behind their more mobile-enabled competitors. Every organization today should have a viable mobile strategy that maximizes its market advantage while addressing the management and security challenges of a mobile-enabled workforce. An essential component of such a strategy is investing carefully in effective mobile management and security tools, as well as in the deployment model that brings the most benefit with the ...

How to Secure Your Wireless Network [ Source: Sophos ]

March 2014- It isn?t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond the basics of wireless security to provide advanced security, manageability and accessibility.

Mobile Device Management Buyers Guide [ Source: Sophos ]

March 2014- With mobile device usage exploding, the average worker now carries three devices. Users are embracing their mobility, flexibility and productivity that come with it. Now more than ever, IT needs to balance data security and end user productivity while managing scarce resources.

Download this MDM buyers guide to learn how to select the right mobile device management solution that fits your company's BYOD objectives. It explains how an effective MDM system can support ...

Making Smarter Mobile Security Decisions [ Source: Dell Software ]

March 2014- This paper examines mobile platform security vulnerabilities and discusses how to protect infrastructure from mobile security threats.

Best Practices for Security and Compliance with Amazon Web Services [ Source: Trend Micro ]

February 2014- Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

Survey Report: Mobile Content Security and Productivity [ Source: Accellion ]

February 2014- This report provides the key findings taken from a survey conducted by AIIM (an advocate and supporter of information professionals) between June and July 2013. Learn how important mobile access is to users, how likely they are to by-pass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.

GigaOm Pro: The Rewards and Risks of Enterprise Mobility [ Source: Accellion ]

February 2014- The productivity gains that are uniquely enabled by the cloud and mobile also present significant enterprise security challenges. Valuable and private data stored on mobile devices presents potential nightmare scenarios for departments and teams using the technology as well as CIOs, CSOs, and IT managers. This research report will outline the importance of balancing the advantages and risk of increasing enterprise mobility.

Enterprise Mobility Management: A Data Security Checklist [ Source: Accellion ]

February 2014- Secure file sharing, syncing and associated productivity requirements impose pressing technical and operational challenges on organizations. This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.

NFC Implementation Model [ Source: UL ]

November 2013- UL developed an innovative process to help mobile network operators, banks, acquirers and merchants implement an NFC payment infrastructure quickly, effectively and securely.

Transaction Security Infographic [ Source: UL ]

November 2013- Learn how technology is transforming transactions - offering greater ease, speed and mobility - while also creating potential security risks and challenges.

Healthcare Information Management: A New Urgency [ Source: Proofpoint ]

November 2013- With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point: get control of your information to enable security, compliance, and innovation, or continue down the current path of information anarchy and pay the consequences. Policies and procedures can only go so far if the amount and variety of information outpaces the ability of the human element to manually mange it. Learn ...

Mobile Devices Drive Majority Of Endpoint Security Concerns [ Source: Lumension ]

October 2013- The results of the 2013 State of the Endpoint study tracked endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats. This study reveals that the state of endpoint risk is not improving and one of the top concerns is the proliferation of personally owned mobile devices in the workplace such as smart phones and iPads. Download "Mobile Devices Drive Majority of Endpoint Security Concerns" to review some of ...

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management [ Source: FrontRange ]

October 2013- Success in meeting today's dynamic organizational requirements is dependent on your ability to securely and reliably empower a mobile workforce through every type of device, whether owned by the business or by an employee. Read this whitepaper to learn the essential practices in Enterprise Mobility Management that will lay the foundation for effective, long-term delivery of business IT services regardless of what devices are used.

Next 25