Standards  >   Network Protocols  >   TCP/IP  >   IP  >  

Mobile IP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Wireless Internet Protocol, Wireless IP, Mobile Internet Protocol
DEFINITION: An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than  … 
Definition continues below.
Mobile IP Reports
26 - 50 of 260 Matches Previous Page  |  Next Page
Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Enterprise security professionals have realized that BYOD, mobility and cloud have increased the threat landscape and made network security increasingly difficult. This resource highlights how to overcome these pain points and build a security architecture for business enablement.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Secure Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: An organization's remote access strategy focuses on IT priorities—protecting the enterprise network and avoiding unnecessary complexity. But the ultimate customer is the user who depends on reliable access to get work done. Learn how IT can address its requirements while delivering a solution people love.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

Citrix

The Need For a New Network Security Strategy in Today's Mobile Enterprise
sponsored by Aruba Networks
ANALYST REPORT: Large organizations face a difficult challenge on two distinct fronts including, the fight against cyber-criminals and the BYOD trend. Access this white paper to discover how enterprises can mitigate risk in the dynamic environment.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
PRODUCT OVERVIEW: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace allowing users to have the freedom to connect to any network and IT is struggling to maintain control. Discover how to maintain policy control, workflow automation and enhance visibility for a seamless mobile experience.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Aruba Networks

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn to integrate BYOD and IT-issued devices on the same SSID, and more.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will address the productivity gap that traditional remote access causes. Access now to discover a centralized controller, a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Checkpoint Software Technologies

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

Enterprise Mobile Management: The Vendors That Matter Most
sponsored by MobileIron
RESEARCH CONTENT: In this resource, Forrester Research evaluates the 11 most significant EMM vendors from 2015 and provides an analysis to help I&O professionals select the right partner for their EMM. Read on to determine why today's EMM provides a model for future unified application and device management and drives secure productivity.
Posted: 08 Feb 2016 | Published: 04 Dec 2015

MobileIron

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: Check out this incredible online resource center that's packed with proven best practices focused on how to transform your data into a powerful strategic asset with a holistic data protection plan—enabling you to access all of your data safely from any endpoint.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Ten Areas Where XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover the best-in-class features of one application virtualization platform, and compare its features to market equivalents. Read on to ensure virtualization solutions deliver rich experience for your users and comply with security regulations.
Posted: 02 Feb 2016 | Published: 31 Aug 2015

Citrix

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

VDI—Simplify Your Migration to Windows 10 and Embrace Desktop Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover how to streamline your migration to Windows 10 with a virtualized infrastructure that simplifies BYOD, app compatibility, and corporate desktop management. Access this paper now to answer your burning questions about this OS and how it pertains to desktop virtualization.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

Citrix

Modern Mobility E-zine – January
sponsored by SearchMobileComputing
EZINE: Discover why many IT departments continue to struggle with compliance in the mobile era and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease into EMM in the modern era.
Posted: 13 Jan 2016 | Published: 08 Jan 2016

SearchMobileComputing

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

How to See Greater Returns from Mobile App Development
sponsored by IBM
WHITE PAPER: This study by Forrester explores the impact of "good" or "bad" mobile apps on a company's brand, revenue, and cost structure. Uncover the difference between a good app and a great one, and learn how to adjust your development strategy to see greater returns.
Posted: 04 Jan 2016 | Published: 31 Oct 2015

IBM

Analyzing WAN Congestion in UC & Converged Environments
sponsored by NetScout Systems, Inc.
WEBCAST: In this webcast, you will learn how to analyze and mitigate WAN congestion in your UC and converged communications environments via a service platform. View now to access a network application monitoring platform that will allow you to visualize link performance, identify service quality degradation, and more.
Posted: 04 Dec 2015 | Premiered: Dec 4, 2015

NetScout Systems, Inc.

A Guide to UC Cloud Services Providers and Their Security Measures
sponsored by Carousel Industries
EGUIDE: In this expert e-guide, you will discover the best practices for deploying cloud-based UC platforms. Read this exclusive guide now to assuage your UC fears about encryption and multi-tenancy, and bolster your UC cloud platform security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Carousel Industries

An Expert Guide to the Best Practices for Cloud-Based UC
sponsored by Carousel Industries
EGUIDE: In this exclusive e-guide, you will discover why cloud UC best fits today's mobile workforce, and why enterprises are moving beyond premises-based UC hardware and choosing cloud-based UC technology.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Carousel Industries

Provide Fast Triage for UC and SIP Trunking
sponsored by NetScout Systems, Inc.
PRODUCT OVERVIEW: SIP trunking is being broadly deployed to save on UC expenses, but not at the expense of quality service. The complexity of these multivendor implementations requires an agnostic service assurance solution to reduce time lost to vendor finger-pointing and quickly point at the source of the problem.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

NetScout Systems, Inc.

Unified Communications as a Service: Moving UC to the Cloud
sponsored by Carousel Industries
EGUIDE: In this exclusive e-guide, you will learn how the Skype platform is bolstering workplace collaboration by way of managed services delivery and offering employee's many avenues of communication. View this guide now to see the benefits of Unified Communications as a Service (UCaaS) and how to migrate your UC to the cloud.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Carousel Industries

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix
PODCAST: In this podcast, you will discover how to expand your business reach and mobilize your enterprise with Citrix mobility and Windows 10. Get the insider's look at how Windows 10 can transform your business, as well as 10 tips to ensure your W10 readiness.
Posted: 17 Nov 2015 | Premiered: Nov 6, 2015

Citrix

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry
26 - 50 of 260 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE IP DEFINITION (continued): … An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than their home network.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement