enterprise mobile

Results 126 - 150 of 640Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: May 19, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, software vendors, software, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: iPass     Published Date: Apr 08, 2009
Learn what Forrester has uncovered in their latest report on Enteprise Mobility trends. During the past two years, Forrester has seen the number of enterprise mobility inquiries increase nearly 55%, jumping to 550-plus inquiries in 2008. In the past year, we have seen a spike in the number of inquiries focused on mobile network architecture, new types of mobile devices, and deploying vertically focused mobile applications that address the needs of workers in certain industries (e.g., retail, transportation, and healthcare).
Tags : 
forrester, wireless, infrastructure, fmc, fixed mobile convergence, network architecture, healthcare, retail, transportation, wimax, roi, return on investment, wlan, wimax
    
iPass
Published By: ServiceNow     Published Date: Nov 22, 2013
Whether you’ve embraced it or not, mobile is already part of your business. To remain relevant, IT must think like the business. IT must reinvent itself and become more of a technology advisor and less of a technology traffic cop. This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
servicenow, enterprise it, mobile computing, mobile initiative, it managers, progressive enterprise, mobile users, bring your own device, mobile device management, mobile adoption, mobile maturity model, mobile savvy, actionable analytics, renew it
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 22, 2013
As technology continues to advance and the new reality is based on an infrastructure that includes physical, virtual and cloud resources, IT departments need to find new ways of managing and securing this vastly different technology ecosystem.
Tags : 
servicenow, enterprise it, it department, cloud generation, social networks, mobile workforce, virtualization, cloud computing, collaborative, service-oriented, cloud platform, drive down expenses, increase efficiency, cloud-driven technology, streamlines operations, fluid systems manageable, it management
    
ServiceNow
Published By: MobileIron     Published Date: Jul 31, 2015
Windows 10 is a major OS overhaul that unifies device and security management for the modern enterprise architecture by converging separate OS versions onto one platform managed by an EMM console. This Infographic details 10 tips for ensuring you and your organization are ready to upgrade to Windows 10.
Tags : 
windows 10, emm, enterprise mobile management, mobile it administrators, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
    
MobileIron
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Although they have been around for several years, virtual desktop and application virtualization solutions have not yet gone mainstream in most enterprises. That’s bound to change, however, given advances in the technologies and the increasing need to deliver a great computing experience to mobile device users. Read this Executive Viewpoint Q&A with VMware Senior VP and General Manager of Desktops Sumit Dhawan, as he explains why it’s time to revisit virtual desktop and application virtualization technologies. "
Tags : 
    
VMware AirWatch
Published By: Ping Identity     Published Date: Feb 12, 2016
Many enterprises today are actively pursuing mobile device initiatives—largely driven by the desire to support BYOD, which holds high potential for productivity gains as well as improved employee satisfaction.
Tags : 
    
Ping Identity
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Lookout     Published Date: Dec 09, 2016
Read why analyst firm Ovum says there is "an urgent need for protection systems” to secure enterprise mobile devices.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 09, 2016
Our co-founders John Hering and Kevin Mahaffey have put together a list of our predictions, the way we see the mobile security industry moving in detail.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 09, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 09, 2016
The top five questions your security and IT peers have about mobile security, answered. Get details on top threats, critical gaps, and why enterprises need visibility into mobile today.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 09, 2016
Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success.
Tags : 
future, enterprise, mobile security, predictions, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
practitioners, enterprise, mobile security, productivity, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
idg, mobile workforce, analysis, technology, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Over the past year, Gartner has provided important observations and guidance on Enterprise Mobility Management (EMM) and mobile security solutions. Read the report for key insights into the differences between the two as well as to better understand current state of mobile threat defense.
Tags : 
gartner, market, insights, mobile threat, emm, lookout
    
Lookout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com