Software  >   Systems Software  >   Systems Management Software  >  

Mobile Device Management Software

RSS Feed   
Mobile Device Management Software Reports
1 - 25 of 531 Matches Previous Page  |  Next Page
Ivanti Neurons Edge Intelligence - Demo
sponsored by Ivanti ANZ
VIDEO: Being on the edge is a goal for companies, but what does that mean? Edge intelligence services, like that provided by Ivanti Neurons’ platform, can help businesses stay informed about how, when, where, and why devices are being used within their ecosystem. Watch this short demo to learn more about achieving endpoint edge intelligence.
Posted: 07 Aug 2020 | Premiered: 07 Aug 2020

Ivanti ANZ

Overcome 5 IoT Device Management Challenges
sponsored by ARM
EGUIDE: As IoT devices proliferate every area of business, organizations need to ensure they're managing them and the network supporting them correctly. In this e-guide, learn how you can overcome the top 5 challenges of managing IoT.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

ARM

Jeff Abbott & Nayaki Nayyar, Ivanti: CUBE Conversation, July 2020
sponsored by Ivanti ANZ
VIDEO: Tune in to sit in on a discussion between Jeff Abbott, President of Ivanti and Nayaki Nayyar, EVP & Chief Product Officer at Ivanti, hosted by Lisa Martin of The Cube, as they discuss recent developments at Ivanti, their outlook on COVID-19’s impact on endpoint management, and more.
Posted: 29 Jul 2020 | Premiered: 29 Jul 2020

Ivanti ANZ

Ivanti Neurons
sponsored by Ivanti ANZ
PRODUCT OVERVIEW: As the number of endpoints, edge devices, and data volumes explode in scale, cyber-security threats are also reaching new heights. Dive into this paper to learn how hyper-automation can proactively, predictably, and autonomously self-heal and self-secure device and self-service end users.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Ivanti ANZ

Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER: The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

2020 Trends in Mobility Management: Are You Prepared for IoT, 5G, AI and Beyond?
sponsored by Calero MDSL
VIDEO: Tune into this webinar to hear industry experts discuss the emerging technologies poised to make the greatest impact on modern mobility practices, including IoT, 5G, artificial intelligence, and much more.
Posted: 20 Jul 2020 | Premiered: 20 Jul 2020

Calero MDSL

Five Ways to Immediately Cut or Optimize Mobile Costs in a Suddenly Weakened Economy
sponsored by Calero MDSL
RESOURCE: Access this resource to learn the top 5 actions to address mobile costs due to COVID-19.
Posted: 15 Jul 2020 | Published: 22 Apr 2020

Calero MDSL

A single approach for all platforms and form factors
sponsored by Quest
RESOURCE: This paper explores the evolution of UEM and the most useful characteristics in a UEM product. Readers will take away ideas on unifying endpoint management for all devices in their organizations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Quest

Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal
sponsored by Itergy
VIDEO: After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.
Posted: 10 Jul 2020 | Premiered: 16 Jun 2020

Itergy

Mobile Customer Engagement and the Rise of the App-Based Banking Landscape
sponsored by TATA Communications
WHITE PAPER: Explore findings on the adoption of mobile technology for customer engagement in retail banks, including how to get started and possible benefits in this white paper.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

TATA Communications

12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE: Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

NowSecure

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

Identity Proofing
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: Today’s customers and end users demand fast, secure digital interactions from the organizations they do business with. This white paper highlights the key features and capabilities of Entrust Datacard’s ID Proofing offering, designed to provide fast, accurate and fully digital identity proofing. Read on to learn more.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

Entrust, Inc.

Identity Proofing to Accelerate Customer Acquisition and Onboarding
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As the mobile banking industry grows more competitive, each new application user (or non-user) plays a critical role in the bank’s success. This solution brief takes a closer look at the key features and capabilities of Entrust Datacard’s Identity proofing solution, designed to improve security and customer experience.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

Entrust, Inc.

Securing Corporate Data When Remote Working is the Norm
sponsored by Thales
RESOURCE: As companies are enabling record amounts of remote workers with access to corporate data, it is important for security team s to consider the necessary measures to take for protecting sensitive data. This article offers a list of useful tips for your teams to implement to avoid unnecessary risk. Read on to get started.
Posted: 29 Apr 2020 | Published: 07 Apr 2020

Thales

Secure Remote Access for Employees
sponsored by Thales
WHITE PAPER: In today’s business environment, employees require constant access to information and services. It’s become more critical than ever for organizations to take a calculated approach towards how they secure remote access. This guide highlights several effective approaches for you to consider.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?
sponsored by CI Security
WEBCAST: The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020

CI Security

Securely Maintain Business Continuity with A Remote Workforce
sponsored by Cybereason
WHITE PAPER: In response to social distancing recommendations, organizations have had to rapidly enable their entire staff to work remotely. However, such a dramatic shift can often lead to security oversights, which result in vulnerabilities. Read on to unlock a checklist and ensure your organization didn’t miss any vital preparation steps.
Posted: 20 Apr 2020 | Published: 17 Mar 2020

Cybereason

2020 Cyber Hygiene Report
sponsored by Automox
WHITE PAPER: Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.
Posted: 10 Apr 2020 | Published: 10 Apr 2020


Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce
sponsored by Automox
WEBCAST: Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020


End-to-End Security Solutions for Mid-Market Businesses
sponsored by Dell Technologies and Intel
WEBCAST: Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

Dell Technologies and Intel
1 - 25 of 531 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info