Software  >   Systems Software  >   Systems Management Software  >  

Mobile Device Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device Management SoftwareReports
201 - 225 of 666 Matches Previous Page  | Next Page
Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software

Business Insight: Enabling User Mobility with Enterprise Security Solutions
sponsored by Dell Software
WHITE PAPER: Learn how to enable user mobility through better security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. This white paper tells how to blend life and work activities like never before – while keeping your company secure.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Dell Software

The Promises and Pitfalls of BYOD
sponsored by Dell Software
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Dell Software

Mobile Application Delivery: The Next Frontier
sponsored by SearchSecurity.com
EBOOK: BYOD, plus virtualization and cloud computing, offer IT new ways to address mobile application delivery and mobile device security. A good mobile app plan includes all of them.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

SearchSecurity.com

From Blackberry to BYOD
sponsored by Citrix
WHITE PAPER: This informative white paper examines an enterprise mobility solution that can help streamline your transition from corporate-issued mobile devices to user-owned ones, allowing your organization to fully embrace BYOD and all of the increased productivity and efficiency that comes with it.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Citrix

Choosing an MDM Platform: Where to Start the Conversation
sponsored by BlackBerry
WHITE PAPER: Get seven critical questions to ask when searching for a mobile device management solution.
Posted: 29 Jan 2014 | Published: 18 Jul 2014

BlackBerry

Mobility Management Selection Guide
sponsored by SearchSecurity.com
WHITE PAPER: This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

SearchSecurity.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

BYOD Predictions for 2014 - Webinar
sponsored by Extreme Networks
WEBCAST: This exclusive webcast takes an in-depth look at the future of mobile computing in the enterprise, discussing predictions by industry experts and examining what your organization can do to prepare for what's ahead.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Extreme Networks

Case Study: Implementing BYOD at Wittenberg University
sponsored by Extreme Networks
CASE STUDY: This exclusive case study discusses how a university with limited resources was able to use a series of networking tools to centralize mobile management while providing the performance needed to support BYOD.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Extreme Networks

Your WiFi May Not Be Ready for 11ac
sponsored by Extreme Networks
WEBCAST: This informative webcast discusses how to determine whether or not your Wi-Fi network is ready for 802.11ac and examines how you best prepare for the next generation of wireless networking.
Posted: 15 Jan 2014 | Premiered: Jan 15, 2014

Extreme Networks

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 14 Jan 2014 | Published: 14 Jan 2014

Hewlett-Packard Company

Building Mission Critical Wireless for Apple Devices
sponsored by Extreme Networks
WEBCAST: This exclusive presentation discusses how you can best manage mobile devices on your network so that users get the services they want and IT gets the control it needs. While this webinar specifically addresses iOS devices, it's lessons can also be applied to the other leading mobile platforms.
Posted: 13 Jan 2014 | Premiered: Jan 13, 2014

Extreme Networks

Build a strategy to utilise mobility to its full potential
sponsored by IBM
WHITE PAPER: This exclusive paper discusses what your organization can do to formulate a mobile strategy that encompasses the spectrum of mobile efforts, while also addressing and preparing for the common challenges of implementation.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

IBM

Mobile Device Management Checklist
sponsored by Citrix
EGUIDE: This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Citrix

Guidelines for deploying Citrix BYOD solutions
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines how to formulate a successful, service-oriented BYOD model and how you can define and deploy the mobile approach that is right for your organization.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Citrix

Key Considerations For Mobile Device Security and Management
sponsored by Code42
EGUIDE: This expert guide from SearchConsumerization.com examines specific liabilities that you must consider when formulating your mobile security strategy, along with common challenges and potential loopholes in security solutions you may encounter.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Code42

Magic Quadrant for Client Management Tools
sponsored by IBM
WHITE PAPER: This informative resource analyzes and compares the top client management solutions on the market, examining their strengths and weaknesses so you can evaluate which tool is best suited to your organization's needs.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

IBM

Deploy Your BYOD Solution—Cisco Design Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this exclusive resource, get the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution that fits your organization's needs.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Cisco Systems, Inc.

Cisco Mobility Assessment—Is Your Business Ready?
sponsored by Cisco Systems, Inc.
ASSESSMENT TOOL: This simple mobility assessment evaluates your readiness and provides you with suggested services, products, and solutions that can help you take advantage of the latest trends.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Cisco Systems, Inc.

How to Maximize Benefits of SIP Trunking for your Business
sponsored by XO Communications
EGUIDE: This expert guide from SearchUnifiedCommunications.com highlights how you can best use SIP trunking to reduce costs, focusing on two methods that are not commonly practiced.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

XO Communications

Top 5 Mobility Security Concerns with Consumerization
sponsored by More Direct
EGUIDE: This expert guide from SearchConsumerization.com examines how your organization can overcome the security problems that consumerization can bring. Read on to learn how to ensure mobile data security and compliance while supplying enough network bandwidth for BYOD.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

More Direct

Secure Mobile Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

Cisco Systems, Inc.

The Role of Integrated Network Services in Next-Generation Application Delivery
sponsored by F5 Networks
WHITE PAPER: This informative spotlight examines the next generation of integrated application-delivery solutions and the impact that they will have in developing more agile network functions. Read on to learn how your organization can best prepare for the future.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

F5 Networks

Using All the Tools You can
sponsored by Ruckus Wireless
WHITE PAPER: This informative paper discusses the latest generation of Wi-Fi technology and how you can use these tools to get the best Wi-Fi performance possible.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Ruckus Wireless
201 - 225 of 666 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement