Software  >   Systems Software  >   Systems Management Software  >  

Mobile Device Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device Management Software Reports
226 - 250 of 651 Matches Previous Page  |  Next Page
How to Deploy Rock-solid Wi-Fi in Unique Areas
sponsored by Xirrus
CASE STUDY: This exclusive case study discusses a Wi-Fi solution that was utilized by a large public venue to provide a specialized, flexible, and high-capacity wireless network.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Xirrus

Mobile Application Delivery: The Next Frontier (An Expert Handbook on Mobile Application Management)
sponsored by SearchSecurity.com
EBOOK: This expert handbook features three articles that examine the best approaches to take when delivering mobile applications.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

SearchSecurity.com

The ABCs of 802.11ac
sponsored by Xirrus
WHITE PAPER: This informative paper gives you a look at the ins-and-outs of 802.11ac so that you can familiarize yourself with the technology and fully utilize it as quickly as possible.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

Xirrus

How to avoid another #wifail?
sponsored by Xirrus
WHITE PAPER: This exclusive paper examines the factors that cause Wi-Fi network strain and discusses what your organization can do to avoid them.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Xirrus

Mobility Management Selection Guide
sponsored by SearchSecurity.com
WHITE PAPER: This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

SearchSecurity.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Magic Quadrant for Client Management Tools
sponsored by IBM
WHITE PAPER: This informative resource analyzes and compares the top client management solutions on the market, examining their strengths and weaknesses so you can evaluate which tool is best suited to your organization's needs.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

IBM

Deploy Your BYOD Solution—Cisco Design Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this exclusive resource, get the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution that fits your organization's needs.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Cisco Systems, Inc.

Cisco Mobility Assessment—Is Your Business Ready?
sponsored by Cisco Systems, Inc.
ASSESSMENT TOOL: This simple mobility assessment evaluates your readiness and provides you with suggested services, products, and solutions that can help you take advantage of the latest trends.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Cisco Systems, Inc.

How to Maximize Benefits of SIP Trunking for your Business
sponsored by XO Communications
EGUIDE: This expert guide from SearchUnifiedCommunications.com highlights how you can best use SIP trunking to reduce costs, focusing on two methods that are not commonly practiced.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

XO Communications

Top 5 Mobility Security Concerns with Consumerization
sponsored by More Direct
EGUIDE: This expert guide from SearchConsumerization.com examines how your organization can overcome the security problems that consumerization can bring. Read on to learn how to ensure mobile data security and compliance while supplying enough network bandwidth for BYOD.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

More Direct

Secure Mobile Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

Cisco Systems, Inc.

The Role of Integrated Network Services in Next-Generation Application Delivery
sponsored by F5 Networks
WHITE PAPER: This informative spotlight examines the next generation of integrated application-delivery solutions and the impact that they will have in developing more agile network functions. Read on to learn how your organization can best prepare for the future.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

F5 Networks

Using All the Tools You can
sponsored by Ruckus Wireless
WHITE PAPER: This informative paper discusses the latest generation of Wi-Fi technology and how you can use these tools to get the best Wi-Fi performance possible.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Ruckus Wireless

BYOD Predictions for 2014
sponsored by Extreme Networks
WEBCAST: This exclusive webcast takes an in-depth look at the future of mobile computing in the enterprise, discussing predictions by industry experts and examining what your organization can do to prepare for what's ahead.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Extreme Networks

Case Study: Implementing BYOD at Wittenberg University
sponsored by Extreme Networks
CASE STUDY: This exclusive case study discusses how a university with limited resources was able to use a series of networking tools to centralize mobile management while providing the performance needed to support BYOD.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Extreme Networks

How to Implement Continuous Testing for Optimal Mobile Performance
sponsored by SOASTA, Inc
WEBCAST: This on-demand webcast discusses how to implement continuous testing in order to optimize mobile performance, and takes an inside look at the technologies and tools fueling mobile testing success.
Posted: 06 Jan 2014 | Premiered: Dec 11, 2013

SOASTA, Inc

5 Approaches that will kill your mobility project
sponsored by Citrix
WEBCAST: This crucial webcast takes an in-depth look at five common enterprise mobility mistakes that may not seem that bad, but can end up killing your mobile initiatives.
Posted: 06 Jan 2014 | Premiered: Jan 6, 2014

Citrix

How the New Mobile Supply Chain Impacts Field Sales and Field Service
sponsored by DSI
WHITE PAPER: This FAQ sheet provides answers to your pressing mobile supply chain questions, revealing how mobility is impacting field service and field sales, key benefits you can achieve, and more.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

DSI

Taking your enterprise mobile:  Executive checklist
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment.
Posted: 02 Jan 2014 | Published: 02 Jan 2014

Citrix

Embracing BYOD through secure app and data delivery EMM
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses an enterprise mobility management (EMM) solution that empowers consumerization and bring your own device (BYOD) programs through secure application and data delivery allowing for a diverse, productive and efficient mobile environment.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix

Clifford Hallam Healthcare Mobilizes Oracle's JD Edwards Enterprise One and Creates Complete Traceability
sponsored by DSI
CASE STUDY: This brief case study examines how Clifford Hallam Healthcare found success by mobilizing its business processes, which allowed the health service provider to increase accuracy and accountability, reduce labor costs, and more.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

DSI

Just Released: Magic Quadrant for Network Access Control
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: Network access control (NAC) vendors are realizing the necessity of integration with other mobile device management (MDM) and security technologies. When choosing a NAC solution, the ability to integrate is a top concern -- but what else should you consider when evaluating various vendors?
Posted: 24 Dec 2013 | Published: 12 Dec 2013

ForeScout Technologies, Inc.

Checklist: A Checklist for BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This exclusive resource provides a helpful checklist that can establish a guide for determining the BYOD strategy for your organization, from infrastructure considerations to security requirements.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Code42

With the MobileIron Platform, Sally Beauty puts a new face on its sales team
sponsored by MobileIron
CASE STUDY: This exclusive case study examines how an international specialty retailer was able to use an enterprise mobility management (EMM) platform in order to better empower their mobile workforce, resulting in increased productivity and efficiency while minimizing costs.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

MobileIron
226 - 250 of 651 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement