IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Workers Reports
226 - 250 of 1189 Matches Previous Page  |  Next Page
10 Considerations to Secure a Strong ROI for Unified Communications
sponsored by AVST
WHITE PAPER: This white paper details a list of 10 considerations that can help secure a strong ROI from your unified communications program. Read on to learn more.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

AVST

Magic Quadrant for Enterprise Mobility management Suites
sponsored by Citrix
WHITE PAPER: This exclusive vendor comparison from Gartner offers a look at different EMM suite providers and their key differences and benefits. Read on to learn more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Citrix

Gartner: How CIOs should prepare for optimising IT in the digital economy
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analyst Michael Smith argues that CIOs should adopt a dual approach to supporting the enterprise's transformation to the digital economy.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

ComputerWeekly.com

Mobile Apps for Field Service: Proven Strategies from Roll-Out to ROI
sponsored by Kony
WHITE PAPER: This whitepaper discusses how organizations can proactively manage their customer relationships and deliver superior customer service – all by implementing mobile and cloud tools for their field representatives.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony

Mobile App Management: Reduce Complexity, Tighten Security
sponsored by BlackBerry
WHITE PAPER: Access this in-depth whitepaper to discover the essentials of integrating your mobile application management strategy within your overall enterprise mobility management solution. Find out how the right MAM strategy can reduce complexity and tighten security.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

How Mobile IT Teams are Boosting Business ROI
sponsored by Box
WHITE PAPER: Access this infographic for quick tidbits about the current state of the mobile enterprise, and what advantages companies can expect from implementing a thorough and planned out mobile strategy.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Box

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by Commvault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Commvault

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Buyer's Guide to 802.11ac Wireless: The Time to Move is Now!
sponsored by Extreme Networks
WHITE PAPER: Keeping the network up to speed is no easy task - but with wireless from 802.11ac, speed can be increased by up to three times as much as before. Read on to learn more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Extreme Networks

EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at enabling unified endpoint and service management for mobile workers. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

FrontRange Solutions Inc.

Optimizing Your Service Delivery: Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Check out this white paper to learn about the best practices for maximizing efficiency, and for several challenges that are associated with service delivery.
Posted: 20 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Innovating Through Cloud Technologies Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper takes a look into the challenges surrounding the implementation of the cloud among businesses.
Posted: 17 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Embracing Trends and Technologies: Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, discover why organizations must embrace best practices for implementing change, as well as unified management solutions that facilitate simplified, reliable and cost-effective implementation.
Posted: 17 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

What VMware Horizon 6 can offer you
sponsored by VMware, Inc.
WHITE PAPER: This resource walks through the major trends impacting employee work styles, how the role of IT is changing to adapt, and a desktop virtualization strategy that can help support and optimize mobile capabilities.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware, Inc.

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

What's Next for Mobile Application Development
sponsored by IBM
EGUIDE: This expert e-guide offers best practices for building cost-effective mobile applications.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Jumpstart Your Mobile Application Development Project
sponsored by IBM
EGUIDE: This expert e-guide explores how to handle the explosive growth in the mobile application development landscape.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Everything You Need to Know about Enterprise Mobility Management
sponsored by CA Technologies.
EBOOK: Enterprise mobility management (EMM) strategies encompass several challenging problems for IT. From meeting the ever-increasing demands of end-users and the mobile devices they own, to security and threat risks, there is a lot to know about EMM.
Posted: 18 Sep 2014 | Published: 11 Sep 2014

CA Technologies.

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
226 - 250 of 1189 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement