IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Systems Management

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Systems Management Reports
Making the Case for Converging Enterprise Mobility and IoT Digital Initiatives
sponsored by Red Hat
RESEARCH CONTENT: This Pathfinder report focuses on two digital initiatives largely viewed as discrete but that share high potential: Enterprise mobility and Internet of Things. Learn how these two initiatives can help unlock the full potential of digital transformation for your enterprise.
Posted: 18 Oct 2016 | Published: 29 Feb 2016

Red Hat

How Swiss Re Created a Safe Mobile First Strategy
sponsored by MobileIron
RESEARCH CONTENT: This case study explores how Swiss Re implemented a multi-OS enterprise mobility management system, allowing them the security they desired, and employees the freedom to work with their personal devices. Find out how Swiss Re allowed access to the company intranet from any device, developed a "mobile first" strategy, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016


2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


Mobile App Development Challenges & New Tactics
sponsored by
RESOURCE: Our guide, Stay Aloft With Mobile Applications in the Cloud, reveals trends in mobile app adoption and new challenges facing the developers making them. Find expert advice on navigating today's mobile app challenges, how to choose middleware for your mobile-first strategy, and using mobile apps to exploit IoT cloud services.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

IDC: Rethinking the Network as a Security Sensor and Enforcer
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.
Posted: 08 Sep 2016 | Published: 30 Oct 2015

Cisco Systems, Inc.

Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016


Putting Digital at the Heart of Your Business
sponsored by Red Hat
EBOOK: Digital technologies are a catalyst for new ways of doing business and are leading a wave of innovation and change for organizations. This e-book looks at the impact of mobile and digital on business processes, technology and culture, highlighting 7 steps to a successful digital business.
Posted: 08 Sep 2016 | Published: 30 Jun 2016

Red Hat

Mobile Maturity Survey 2016
sponsored by Red Hat
RESEARCH CONTENT: Users are driving the demand for mobile-enable products and as a result, mobile innovation has rapidly increased and decision-making has shifted from IT to lines of business. Explore the findings of a Mobile Maturity Survey that polled 200 LOB decision makers. Find out what they said about mobile app development, the status of IoT, KPIs, and more.
Posted: 20 Oct 2016 | Published: 31 Jan 2016

Red Hat

VDI Helps Nova Southeastern University College of Dental Medicine Improve Simulation Labs
sponsored by Dell, Microsoft and Citrix
PRESENTATION TRANSCRIPT: Nova Southeast College of Dental Medicine in Ft Lauderdale, FL, found their current simulation lab technology couldn't keep up with student demands. Find out they turned to desktop virtualization to overhaul their simulation lab technology to provide students with the technology they needed to better prepare and train for their dental careers.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell, Microsoft and Citrix

Printer and Embedded Device Security
sponsored by HP
WHITE PAPER: Many printers and embedded devices fail to meet today's enterprise security needs. Uncover five key security capability categories that should be addressed in order to ensure hackers aren't exposing these weak links.
Posted: 19 Oct 2016 | Published: 01 May 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement