Software  >   Systems Software  >   Systems Management Software  >  

Mobile Device Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device Management Software White Papers (View All Report Types)
26 - 50 of 362 Matches Previous Page  |  Next Page
Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content
sponsored by IBM
WHITE PAPER: This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.
Posted: 21 Oct 2016 | Published: 21 Oct 2016

IBM

2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

IBM

Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Appthority

The ABC's of Mobile Device Management
sponsored by IBM
WHITE PAPER: While there are native applications that can do the basics of mobile device management (MDM), only a true MDM platform can make your IT's life simpler. Access this white paper to learn the ABC's of mobile device management and discover ways to enable productivity and data protection for the way people work.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM

Six Steps to Controlling the Uncontrollable
sponsored by Microsoft
WHITE PAPER: With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.
Posted: 18 May 2016 | Published: 01 Apr 2016

Microsoft

Controlling the Uncontrollable: Why You Need to Enable, Protect, and Manage Mobile
sponsored by Microsoft
WHITE PAPER: This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Windows 10 with EMM: TCO Toolkit
sponsored by MobileIron
WHITE PAPER: Read this whitepaper to learn how using EMM to secure and manage your PCs can significantly reduce total cost of ownership by up to 80% across three key areas such as IT operations, helpdesk administration and licensing costs.
Posted: 02 Nov 2016 | Published: 30 Sep 2016

MobileIron

Transforming User IT Support: Bringing Users and Resolution Closer Together
sponsored by IBM
WHITE PAPER: This white paper provides an in-depth look at the right-to-left strategy components designed to help IT leaders evaluate their support environments. Discover ways to demonstrate quantitative improvement in productivity and cost savings.
Posted: 02 Sep 2016 | Published: 31 Dec 2014

IBM

IBM Managed Mobility Services for Mac: Integrate and Manage Mac Devices Across Your Enterprise
sponsored by IBM
WHITE PAPER: Discover a streamlined method for delivering, setting up, configuring, supporting, and managing Mac devices in this white paper. Explore the benefits that IBM's managed mobility services offering can provide, including improved employee satisfaction and productivity, reduced risk to corporate data while enabling device preference, and more.
Posted: 01 Sep 2016 | Published: 29 Apr 2016

IBM

Improve Mobile Infrastructure with an Analytics Workshop
sponsored by IBM
WHITE PAPER: Proprietary analytics tools can help identify and clarify your mobile challenges. Uncover a workshop designed to put mobile business in motion with four steps, including data collection, analysis, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

IBM

The Top Enterprise Mobility Management Suites Compared: An Expert Evaluation
sponsored by vmware airwatch
WHITE PAPER: In this exclusive Magic Quadrant report on enterprise mobility management suites, learn Gartner's take on the top 10+ vendors available. Inside uncover the strengths and cautions of each respected vendor and come out with a far better understanding of which systems can offer you the greatest return on investment.
Posted: 25 Aug 2016 | Published: 19 Aug 2016

vmware airwatch

The 11 EMM Providers That Matter Most And How They Stack Up
sponsored by vmware airwatch
WHITE PAPER: Selecting the right partner for your enterprise mobile management (EMM) can be extremely difficult. An array of vendors exists that widely varies in both offerings and overall quality. Access this report that provides an evaluation of the 11 most significant EMM vendors (based on 25-criteria) to ensure you make the best decision.
Posted: 15 Aug 2016 | Published: 31 Dec 2015

vmware airwatch

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Protect and Distribute BYOD documents
sponsored by IBM MaaS360
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Secure Enterprise Email on Mobile Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Mobile Threat Management
sponsored by IBM MaaS360
WHITE PAPER: Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM MaaS360

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

Five Mobility Trends Making an Impact in the Modern Workplace
sponsored by vmware airwatch
WHITE PAPER: Mobile device management (MDM) lets IT enforce security while granting employees the freedom of mobility. Access this trend brief and uncover ways five ways MDM is transforming the enterprise.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know your organization is poised to make the move to EMM? Access this white paper to determine if now is the time to adopt EMM. Especially if your organization experiences considerable device expansion, an increased need for security and compliance, and more.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

vmware airwatch

Mobile Malware Hits ActiveSync-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron
26 - 50 of 362 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement