Software  >   Systems Software  >   Systems Management Software  >  

Mobile Device Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device Management SoftwareReports
1 - 25 of 703 Matches Previous Page  | Next Page
Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

How LeapFrog handled their BYOD project with Citrix
sponsored by Citrix
CASE STUDY: LeapFrog Enterprises, Inc, a leader in educations entertainment for children, needed a better way to manage corporate and BYOD devices at scale, improve the ease of use for administrators and help desk, and to ensure that their data was secure. The following case study explores their journey and how they attained these benefits with Citrix.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Citrix

How to survive security risks within a BYOD environment
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dell, Inc. and Windows 8 Pro

Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

Mobility Customer Success Stories: BYOD and Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: Let's face it; Employees bring their own devices into work and want to be able to connect to corporate networks. There are a lot of vendors in mind when deciding on a BYOD strategy, and the best fit depends on your company.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Cisco Systems, Inc.

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

Enterprise Security: Attacking the problems of application and mobile security
sponsored by Orasi
WHITE PAPER: Mobile devices, applications, and the network infrastructure are particularly vulnerable to attack and intrusion – and can all too often be the weak link in an otherwise secure enterprise infrastructure. This in-depth resource dives into trends in enterprise security, focusing on mobile systems and malware.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Orasi

How 4 Citrix Customers Solved the Enterprise Mobility Challenge
sponsored by Citrix
WHITE PAPER: For mobile workers to truly be productive, they need on-the-go access to apps and data, even on their personal devices.  Enterprises need a way to deliver these other types of apps on mobile devices now- but IT rarely has the time or budget to build mobile versions.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Citrix

The Definitive Guide to Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: Enterprise organizations today are allowing a new generation of users - known as the mobile generation - to maximize productivity by relying on mobile devices for every aspect of work and personal communication.  However, networking security concerns are emerging.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Aruba Networks

Creating a Safe BYOD on a Budget
sponsored by Extreme Networks
WHITE PAPER: There's no doubt that with the growing trend of mobility, BYOD is right along there with it.  BYOD implementation can be difficult and costly, but this white paper can help.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Extreme Networks

How One Office Benefited from a Large Network Wi-Fi Solution
sponsored by Aruba Networks
CASE STUDY: With potentially tens of thousands of users accessing network data from over 2,000 access points, there's no doubt that the connection needs to be safe and strong.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Aruba Networks

Wi-Fi Enabled Healthcare
sponsored by Extreme Networks
WHITE PAPER: Rapid advancements in wireless technologies are transofrming how business services are delivered, extending access to critical data anywhere, anytime.  This leaves businesses with a host of opportunities and challanges inside and outside company walls.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

Extreme Networks

Wi-Fi Buyers Guide
sponsored by Extreme Networks
WHITE PAPER: The huge growth of mobile and BYOD is driving user's demands to rise, while networks become more dense and harder to manage.  How can a balance be found between the two?
Posted: 23 Sep 2014 | Published: 23 Sep 2014

Extreme Networks

Netsurit Moves 12,000 Devices to N-Able
sponsored by N-able Technologies
WHITE PAPER: This case study explains how one MSP was able to leverage the IT channel's #1 RMM and MSP professional services automation (PSA) platform.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

N-able Technologies

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation.  End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 19 Sep 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

Define Corporate Policies to Manage the Mobile Workplace
sponsored by IBM
EGUIDE: Consult the following solution spotlight to examine the biggest challenges presented to the business due to the BYOD transformation. Additionally, gain access to the top 6 steps to help you build a mobile workplace strategy before it's too late to react.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

IBM

From MDM to Automation, CPI Charts Course for Managed Services Success with N-Able
sponsored by N-able Technologies
WHITE PAPER: This case study details how one organization was able to transition from a break-fix model to managed services by leveraging the IT channel's #1 RMM and MSP service automation platform.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

N-able Technologies

Delivering multichannel web experiences with IBM solutions
sponsored by IBM
WHITE PAPER: Access this paper to learn how to power multichannel web experiences and empower the lines of business that fuel them. As you read, you'll learn about identifying devices and directing the web experience, building responsive multichannel experiences, and much more.
Posted: 16 Sep 2014 | Published: 31 Oct 2012

IBM

State of Indiana puts constituents first with mobile solution
sponsored by MobileIron
CASE STUDY: Switching mobility strategies and devices can be hectic for IT.  This case study examines how the state of Indiana used a management solution that got the job done with much less stress on the enterprise network.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

MobileIron

Security for the Mobile First Era
sponsored by MobileIron
RESOURCE: Along with the great benefits of mobility came the daunting security risks.  As mobile networks becoming increasingly more diverse, it's important to have a security plan that can keep up.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

MobileIron

SMS IT Alerts: Out-of-Band SMS For a Peace of Mind
sponsored by TalariaX
WHITE PAPER: Check out this brief resource that explains how useful out-of-band short message service (SMS) alerts can be to your organization's productivity and security.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

TalariaX

Raytheon joined us to talk security vs. user experience and Virtual Mobile Infrastructure
sponsored by Raytheon Trusted Computer Solutions
AUDIO FILE: Workforce mobility has brought us many great things, but also plenty of concerns.  IT professionals are still trying to figure out the perfect balance of security and user experience.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Raytheon Trusted Computer Solutions

Truly Mobile File and Print Solution Provides Enterprise-Wide Coverage
sponsored by Novell, Inc.
WHITE PAPER: In this informative white paper, discover a new enterprise-class mobile file and print solution that provides file syncing, sharing, and printing to users wherever they are – all without compromising compliance or security standards.
Posted: 15 Sep 2014 | Published: 31 Dec 2012

Novell, Inc.

Make Worker Mobility a Reality with a Strategic Platform
sponsored by Cisco
PRODUCT LITERATURE: To allow your employees to access the business applications they need from any device, you need a solid, secure mobility strategy. In this resource, discover a fully integrated mobility architecture optimized to get your users mobile in no time at all.
Posted: 12 Sep 2014 | Published: 31 Mar 2014

Cisco

The New Mobility: Astonishingly Simple and Powerful
sponsored by Aerohive Networks
WHITE PAPER: Mobility hasn't only changed the way we do business, it's completely redisgned network infrastructure.  In order to stay ahead of the game, you need to make sure your network is modernized.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Aerohive Networks
1 - 25 of 703 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement