IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Workers White Papers (View All Report Types)
151 - 175 of 746 Matches Previous Page  |  Next Page
Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by Commvault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Commvault

The four cornerstones of a successful BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Dell, Inc. and Intel®

IDC Analyst Connection: Is Your Print and Document Infrastructure...Intellectual Property Security
sponsored by Hewlett-Packard Company
WHITE PAPER: In this analyst Q&A, Angèle Boyd, Group Vice President and General Manager, Imaging/Output Document Solutions, IDC, shares her insights and advice on a range of important printer and document-management related business productivity and IP security issues.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Hewlett-Packard Company

Avoid the information governance traps of BYOD management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this e-guide, learn the steps you must take to achieve a solid governance and mobile device management strategy to help your organization avoid these information governance traps. Read on to learn more.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc. and Intel®

BYOD or COPE - Which enterprise mobility strategy is right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This e-guide highlights comparison points for the two models, including control,privacy, productivity, and more. Learn which model would be the best fit for your organization.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc. and Intel®

Transform the Delivery of Endpoint Management Services
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Read this white paper to find out how to enable users to access business resources form any device, anywhere, at any time. Transform the delivery of endpoint management services from being proactive to reactive.
Posted: 06 Feb 2015 | Published: 21 Nov 2014

FrontRange Solutions Inc.

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 01 Feb 2015 | Published: 26 Aug 2014

Hewlett-Packard Company

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Making Your Enterprise Mobile Ready
sponsored by Accellion, Inc.
WHITE PAPER: Read this eBook to understand the needs and wants of a mobile workforce and the security policies and solutions enterprise IT should be considering.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

The Security Impact of Mobile Device Use by Employees
sponsored by Accellion, Inc.
WHITE PAPER: Read this report to learn about the behaviors that companies must address to prevent the misuse and abuse of their sensitive information and the recommendations to mitigate the risks created by these behaviors.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

Mobile File Sharing Solutions: 7 Key Factors
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 7 key reasons why Accellion is selected over Dropbox to meet the need for a mobile, scalable, secure content management and sharing solution that extends enterprise security policies and controls to all devices.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

New Enterprise Imperative - Securing Mobile Content
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the requirements for providing secure mobile access to ECM platforms and cloud storage services, and how to best enable mobile productivity for your work force
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

Endpoint Data Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

Commvault

The Aragon Research Globe for Mobile Content Management, 2014
sponsored by Accellion, Inc.
WHITE PAPER: A growing trend is the shift toward being able to manage mobile content as well as mobile devices and mobile apps. Managing critical content outside of repositories is what MCM is all about. Read the 2014 Aragon Research Globe Report for Mobile Content Management to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

Accellion, Inc.

VDI Comparison: Five Reasons XenDesktop Beats Horizon View
sponsored by Citrix
WHITE PAPER: This white paper explores five ways Citrix XenDesktop and VMware Horizon View compare. Find out how to determine which solution will best help you achieve the goals of your own VDI initiative.
Posted: 05 Jan 2015 | Published: 31 Jan 2014

Citrix

Secure by Design
sponsored by Citrix
WHITE PAPER: This white paper explores the growing IT security challenges in today's computing environment. Examine a solution that can dramatically reduce the effort required to protect mission-critical information while giving user's fast, simple, flexible remote access.
Posted: 05 Jan 2015 | Published: 31 Jan 2014

Citrix

Six Areas Where Citrix XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, explore an application virtualization strategy that includes the capabilities organizations need for full mobile productivity and how any strategy you choose should take into consideration the end-user and IT.
Posted: 02 Jan 2015 | Published: 28 Nov 2014

Citrix

3 Businesses Share Why They Chose Citrix XenDesktop Over VMware View
sponsored by Citrix
WHITE PAPER: This white paper explores three organizations who selected a desktop and application virtualization strategy that fit their needs from a single, easy to deploy platform. Find out the reasons behind their selection over other competitors and what factors they took into consideration.
Posted: 02 Jan 2015 | Published: 31 Dec 2013

Citrix

The Drive For Efficiency In Branch Office IT
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how a cloud-optimized solution emerged as a true contender in branch office IT support. Read on to learn more.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Mobilizing Window Apps
sponsored by Citrix
WHITE PAPER: This white paper explores a way to deliver Windows-based applications to remote users while properly optimizing them for different types of endpoints. Find out how you can take advantage of this strategy by examining a detailed architecture.
Posted: 30 Dec 2014 | Published: 31 Jan 2014

Citrix

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth
sponsored by Citrix
WHITE PAPER: This white paper explores a comprehensive desktop virtualization solution that can address a broad range of business priorities and use cases. Discover a desktop virtualization solution checklist to help you choose a solution that provides the full set of capabilities required to support every use case in your organization.
Posted: 29 Dec 2014 | Published: 31 Oct 2013

Citrix

Four Customers Who Never Have to Refresh Their PCs Again
sponsored by Citrix
WHITE PAPER: Access this white paper to explore four organizations who have transformed their business by implementing desktop virtualization, paired within client computing. Find out how this enabled IT to escape the costly PC refresh cycles and reallocate their PC refresh budget into other business areas.
Posted: 29 Dec 2014 | Published: 31 Oct 2014

Citrix

Strategic CPM as a Driver for Organizational Performance Management
sponsored by IBM
WHITE PAPER: Read this white paper to learn how leveraging new strategic corporate performance management capabilities enables more coordinated performance management initiatives.
Posted: 11 Feb 2015 | Published: 10 Jan 2014

IBM
151 - 175 of 746 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement