IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Workers White Papers (View All Report Types)
76 - 100 of 651 Matches Previous Page  |  Next Page
Operating a Next-Generation Utility: Driving Performance through Enterprise Asset Management
sponsored by Infor
WHITE PAPER: From aging infrastructures to outdated business systems, you need a way to systematically and efficiently turn these challenges around before they further impede organizational performance. Access this white paper and learn ways to benefit from integrated enterprise asset management (EAM.)
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Infor

5 Key Business Insights for Mobile Security in a BYOD World
sponsored by Lookout
WHITE PAPER: In this white paper, take a closer look at 5 key insights about mobile security and enabling BYOD in your workplace.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Lookout

Why Laptop Security Cannot Wait
sponsored by Commvault
WHITE PAPER: This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.
Posted: 04 Dec 2015 | Published: 02 Dec 2015

Commvault

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. Find out how you can manage risk effectively so your organization can benefit from mobility and flexwork initiatives.
Posted: 13 Nov 2015 | Published: 30 Jan 2015

Citrix

Operational Benefits of Citrix Application and Desktop Delivery
sponsored by Citrix
WHITE PAPER: ESG investigates what drives organizations to adopt desktop virtualization, the benefits they realized, and the key capabilities you need to consider when selecting a desktop virtualization vendor.
Posted: 12 Nov 2015 | Published: 30 Sep 2014

Citrix

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth
sponsored by Citrix
WHITE PAPER: Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to be more productive and for IT to become more efficient. Learn how Citrix XenDesktop allows you to balance user requirements and costs for each use case.
Posted: 12 Nov 2015 | Published: 30 Sep 2014

Citrix

Transforming Traditional Data Centers for More Successful App Rollouts
sponsored by F5 Networks
WHITE PAPER: Discover integrated strategies that transform the existing data center infrastructure to operationalize your network while maintaining high availability and predictable performance for existing applications.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

F5 Networks

Enabling Enterprise Mobility with APIs
sponsored by MuleSoft
WHITE PAPER: This paper reviews the primary drivers and challenges faced by enterprises trying to initiate or support a mobile strategy, and the transformation stories of three market leaders who enabled mobility via API-led connectivity. Access this white paper now to devise a mobile strategy for your business.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

MuleSoft

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: In this white paper, discover the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015


How to Avoid the Software Licensing Cost Trap
sponsored by Matrix42
WHITE PAPER: There is now an urgent requirement for transparency and control over software compliance within companies. This white paper serves as an instructive guide for optimizing your software expenses using asset management, ensuring the efficient use of software.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Matrix42

The New BYOD: Best Practices for a Productive BYOD Program
sponsored by VMware
WHITE PAPER: This white paper demonstrates how to leverage BYOD as a tool to drive mobile accessibility in your business. It outlines the basic measures that must be taken to dramatically boost productivity. Read on now to learn how to transition from corporate-owned devices to a BYOD-centric workplace.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

VMware

BYOD Done Right Is a Win-Win for Workforce Mobility
sponsored by VMware
WHITE PAPER: By accessing this paper, you'll Discover a compromise-free approach to workforce mobility and access now to find out what this particular BYOD strategy entails, and why customization is a key part of it.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

VMware

Introducing Salesforce Health Cloud: 3 Core Advantages
sponsored by Salesforce.com
WHITE PAPER: Access this e-book to discover how the combined powers of the cloud, social and mobile technologies create an environment that enables everyone from specialists to patients to get the information they need at any time and on any device.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Salesforce.com

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015

IBM

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Add Value to your Business with Mobile Working from Any Device, Anytime, Anywhere
sponsored by Vodafone
WHITE PAPER: Access this white paper to learn about a mobility service that allows your employees to work more efficiently and effectively from anytime, anywhere, on any device – without any constraints. You'll also explore the five key features of this strategy.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Vodafone

The Rising Value - and Falling Cost - of App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: The growing strategic value of desktop virtualization is advancing quickly, providing new ways to enable business mobility and increase the flexibility. Learn how falling cost factors in every part of the desktop virtualization architecture making it more affordable than ever.
Posted: 12 Nov 2015 | Published: 29 Aug 2014

Citrix

How to Ensure Success of Your Mobile App Development Projects
sponsored by IBM
WHITE PAPER: In this report, you will learn the best practices for successful mobile application development. Read on to make your mobile project shine with a checklist of project guidelines, as well as advice on how to enable flexible mobile app development platforms with cloud.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

IBM

Transform into a Mobile Enterprise with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper explores how and why the mobile enterprise works. Discover how to make your enterprise a mobile one with cloud technologies.
Posted: 05 Nov 2015 | Published: 30 Sep 2015

IBM

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network from the Inside Out
sponsored by Fortinet, Inc.
WHITE PAPER: In this brief white paper, you will discover if an internal segmentation firewall is the best form of protection for your users and applications. Learn how to enforce more granular security with policy-based segmentation, and contain threats by user, device, and application.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.
76 - 100 of 651 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement