• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

manage devices

Results 51 - 75 of 291Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Sep 06, 2016
The transformation of supply chain management is happening now. IoT is driving that change, but supply chain analytics is instrumental in taming the massive amounts of data generated by IoT sensors, devices and objects and turning it into insight and into a competitive edge. Smart companies recognize this.
Tags : 
supply chain, supply chain management, oracle, security, security application, application security, security management
    
Oracle
By: RES Software     Published Date: Jul 06, 2012
Today's IT managers face tough challenges. There's pressure to reduce IT costs, end user demand for flexible yet secure working, and the constant need to maintain regulatory compliance. Join the IT managers around the world who are solving their biggest challenges with RES Software. Learn how organizations in every sector are giving end users the freedom to work the way they want, in any location and via multiple devices, while drastically reducing demand for hands-on IT professionals.
Tags : 
technology, res software, healthcare, desktop, healthcare it, medical device, it management, desktop migration, reduce it costs, res automation software, windows migration
    
RES Software
By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron
By: VMware AirWatch     Published Date: Feb 21, 2017
Today’s IT organizations simply cannot afford to continue to manage the end user environment with an out-of-date PC-centric approach to systems management. The cloud, mobility and multiplatform environments render that approach ineffective. It’s time to take another look at virtual application and desktop virtualization technologies. Download this whitepaper to look at VMware Horizon, the most complete solution for delivering, managing and protecting Windows desktops, applications and online services across devices, locations, media and connections, making it ideal for systems management transformation.
Tags : 
    
VMware AirWatch
By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, best practices, business intelligence, business management
    
Okta
By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence, cloud computing
    
Okta
By: Jamf     Published Date: Jan 18, 2018
Ace your migration with a manageable timeline. Once the decision is made to switch MDM solutions, the first step is to construct a logical, achievable timeline. The timeline should include critical milestones, financial considerations, school breaks, or any other factors that may impact implementation success. Choose a time when devices can be out of use in order to give IT time to make the transition without impacting users. Download this whitepaper to learn more!
Tags : 
    
Jamf
By: Jamf     Published Date: Jan 18, 2018
Schools are not choosing just any mobile technology. They are adopting iPad, because it is preferred by students and teachers is easier to manage and offers extensive security features. When schools give iPad devices to students, they pave the way for enhanced creativity, more productivity, better engagement and spontaneous collaboration.
Tags : 
    
Jamf
By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
By: Jamf     Published Date: Mar 29, 2018
As iPad and iPhone usage continues to grow in higher education institutions around the world, finding the right way to manage iOS devices can be as important as the technology itself. In this e-book, we’ll educate you on the basics of mobile device management (MDM) and explain how you can maximize your education technology purchases. Become an expert in: • The state of iOS in higher education • Best practices and workflows for iPad and iPhone device management • Moving higher education forward with Apple TV
Tags : 
    
Jamf
By: Jamf     Published Date: Mar 29, 2018
With Mac labs being a major presence on university campuses, many IT admins rely on imaging to ensure computers do not fall prey to viruses and costly data breaches, and to provide students with the education resources they need to be successful. The problem is imaging machines is a tedious and manual process, requiring lots of IT time. In this white paper, we examine a better way to manage a Mac lab and explain how to: • Leverage Apple’s Device Enrollment Program (DEP) to automatically configure and enroll Mac devices into management • Make apps and resources readily available for students to use, regardless which computer they choose • Ensure students only have access to the resources relevant to them by binding machines to your school’s directory services system
Tags : 
    
Jamf
By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
healthcare, mobility, data security, security tips, personal device
    
Citrix ShareFile
By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
By: Sojern     Published Date: Oct 26, 2017
The Sojern Traveler Platform offers hotels of all sizes access to over 350 million traveler profiles that allow you to precisely target prospects at all stages of the marketing funnel. You can also manage campaigns across multiple channels and devices, maintain brand awareness, increase purchase consideration, and turn site visitors into hotel room bookers.
Tags : 
hotel digital marketing, hotel advertising, boutique hotels, independent hotels, hotel website, travel marketing, search engine marketing hotels, revpar, direct bookings
    
Sojern
By: Centrix Software     Published Date: Mar 19, 2014
This paper takes a look at the challenges of end-user estate management in the world of cloud, virtualization, on-premise, mobile devices and desktops
Tags : 
workspace, desktop, end user management, cloud, virtualization, applications
    
Centrix Software
By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : 
model, ddos, protection, solutions
    
F5 Networks Inc
By: Microsoft     Published Date: Oct 24, 2016
This report explores the four elements of an enterprise mobility strategy and how to address the challenges that your enterprise may face in a mobile environment.
Tags : 
enterprise mobility management, mobility, mobile devices, bring your own device, remote access, mobile computing, mobile workers
    
Microsoft
By: Microsoft     Published Date: Oct 24, 2016
This Technology Spotlight examines the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps. It also explores the role of Microsoft's Enterprise Mobility Suite (EMS) in the strategically important EMM market.
Tags : 
mobility, enterprise mobility management, software as a service, cloud, mobile security, remote access, mobile computing, mobile workers
    
Microsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter