IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Workers Reports
126 - 150 of 1237 Matches Previous Page  |  Next Page
TCO - The Rising Value—and Falling Cost—of App and Desktop Virtualization Webinar - On-demand
sponsored by Citrix
WEBCAST: The strategic value of app and desktop virtualization is undeniable. But some organizations remain concerned about the perceived need to maintain a complex infrastructure. Learn about the top trends driving down the cost of app and desktop virtualization and how it streamlines IT infrastructure management in this on-demand webinar.
Posted: 22 Feb 2016 | Premiered: Dec 31, 2014

Citrix

Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

The Need For a New Network Security Strategy in Today's Mobile Enterprise
sponsored by Aruba Networks
ANALYST REPORT: Large organizations face a difficult challenge on two distinct fronts including, the fight against cyber-criminals and the BYOD trend. Access this white paper to discover how enterprises can mitigate risk in the dynamic environment.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
PRODUCT OVERVIEW: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace allowing users to have the freedom to connect to any network and IT is struggling to maintain control. Discover how to maintain policy control, workflow automation and enhance visibility for a seamless mobile experience.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Aruba Networks

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: With the current shift toward mobility becoming the business norm, security needs to be your top priority. Discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn about mobile security best practices.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: There's a gap in productivity caused by traditional remote access. Discover a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

The Business Case for Mobility
sponsored by Lenovo
WHITE PAPER: In this article, you'll explore how implementing a mobility strategy can boost productivity, empower employees, and streamline internal processes. Learn how to align business goals with these benefits to make them a reality.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Lenovo

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

How Mobility is Affecting Wider Business Strategies
sponsored by Lenovo
RESOURCE: Recognizing the most popular choice for online browsing is the first step toward strategizing it. Learn how to align your mobile and business goals when you form clear deliverables and goals, create metrics, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Lenovo

How to Design a Network for Mobile Initiatives
sponsored by Aruba Networks
WHITE PAPER: This guide details how to design your network for mobile initiatives. Learn how to overcome the key challenges facing network administrators today in setting up and managing a modern infrastructure, including security and access control, defining network users, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Aruba Networks

What keeps HR up at night?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey from SilkRoad identifies the three top technology worries of HR professionals when it comes to introducing HR technology software into their business.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

ComputerWeekly.com

The Top 4 Most Pressing Android Mobile Cybersecurity Threats
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this paper, you will break down the most common types of attacks that impact Android mobile devices.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Checkpoint Software Technologies

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Enterprise Mobile Management: The Vendors That Matter Most
sponsored by MobileIron
RESEARCH CONTENT: In this resource, Forrester Research evaluates the 11 most significant EMM vendors from 2015 and provides an analysis to help I&O professionals select the right partner for their EMM. Read on to determine why today's EMM provides a model for future unified application and device management and drives secure productivity.
Posted: 08 Feb 2016 | Published: 04 Dec 2015

MobileIron

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: Check out this incredible online resource center that's packed with proven best practices focused on how to transform your data into a powerful strategic asset with a holistic data protection plan—enabling you to access all of your data safely from any endpoint.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management (EMM) it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Read on to learn about the role EMM should play in your mobile strategy.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

SearchMobileComputing

Top Tips for Managing a Remote Workforce
sponsored by LogicNow
WHITE PAPER: This whitepaper discusses some of the best ways to manage and protect your mobile workforce, such as setting up certain policies and key tools that can help.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

LogicNow

Taking Windows Mobile on Any Device
sponsored by Citrix
WHITE PAPER: Taking Windows applications and desktops mobile has many advantages, but with so many device types to consider, how can you simplify solution implementation? Learn how Citrix XenApp solves this complex problem.
Posted: 22 Feb 2016 | Published: 30 Apr 2015

Citrix

Desktop Virtualization Aids Graphic-Heavy Apps and BYOD
sponsored by NVIDIA/VMware
EGUIDE: This e-guide illustrates how virtual desktops can aid graphics-heavy apps, and will help you discover how GPU virtualization can aid app performance, and ease BYOD management. Access this guide to get an exclusive look at Nvidia vGPU support and its accommodation of VDI graphics demands.
Posted: 12 Feb 2016 | Published: 08 Feb 2016


Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

Protect Revenue and Emphasize User Experience with APM Tools
sponsored by eG Innovations, Inc.
EGUIDE: Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.
Posted: 05 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Best Practices for Building Mobile Apps in the Cloud
sponsored by OutSystems
EGUIDE: In this 3-part expert e-guide, learn how mobile cloud and native apps compare from the developer's perspective. You'll also explore ways to overcome the problem of developing mobile apps that run across many devices, and how HTML5 can provide a less complex and costly alternative.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

OutSystems
126 - 150 of 1237 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement