mobile device security

Results 101 - 125 of 278Sort Results By: Published Date | Title | Company Name
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Theres more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everythingcorporate applications, sensitive customer data, employee health records, etc.was within the safe four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, well explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed.
Tags : 
    
Cisco Umbrella EMEA
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in todays software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises cant risk security slowing this down.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, theyll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson, IBM MaaS360 UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaperGive All the People What They Want (Safely)to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : 
bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobilitybut theyre also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: If your current productivity and collaboration tools are falling short. 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile
Published By: Jamf     Published Date: Jan 14, 2019
The Jamf Pro is the leading mobile device management tool for iOS. Designed to automate common tasks around Apple deployment, inventory and security, Jamf Pro makes mobile device management easy, so you can better ensure a transformative learning experience.
Tags : 
mobile device management, mdm, managed devices, mobile, apple, ios
    
Jamf
Published By: F5 Networks Inc     Published Date: Aug 15, 2013
Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5s new full proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.
Tags : 
domain name system, dns, infrastructure, global, local, cloud load balancing, dns systems, dns infrastructure, mobile devices, security, cloud load balancing, dns solutions, data center, network architecture, network management, network security, servers, traffic management
    
F5 Networks Inc
Published By: Sophos     Published Date: Mar 25, 2011
This paper will explore the current environment of growth in healthcare IT and the emergence of mobile devices as enablers of this growth.
Tags : 
sophos, mobile device security, healthcare it, protected health information, phi
    
Sophos
Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user employees, contractors, guests and even customers appropriate to their role and type of device. Mobility in the workplace isnt just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle gnration repose sur la mobilit. lheure o le nombre dappareils mobiles connects Internet dpasse la population mondiale, il est essentiel que les services informatiques soient en mesure doffrir chaque catgorie dutilisateurs (employs, entrepreneurs, invits et clients) une connectivit fluide et adapte leurs besoins et types dquipement. Outre les atouts vidents pour les utilisateurs et leffet bnfique sur la productivit, la migration vers la mobilit est source de nombreux avantages pour les services informatiques. Tlchargez ce livre blanc pour les dcouvrir
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Der Next-Generation Workplace steht fr Mobilitt. Im Jahr 2013 gab es mehr mit dem Internet verbundene Mobilgerte als Menschen weltweit. Aufgabe der IT ist es, die dafr notwendigen Verbindungen und Netzwerke zu schaffen und dafr zu sorgen, dass diese an die Anforderungen der unterschiedlichen Benutzergruppen, an ihre Aufgaben sowie die eingesetzten mobilen Gerte angepasst sind sei es fr Angestellte, Unternehmer, Gste oder Kunden. Mobiles Arbeiten steigert die Produktivitt und bietet zahlreiche Vorteile fr den Anwender aber auch IT-Verantwortliche knnen profitieren. Laden Sie unser Whitepaper herunter und berzeugen Sie sich von den Vorteilen...
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la prxima generacin se centra totalmente en la movilidad. En este ao 2013 hay ms dispositivos mviles con conexin a Internet que personas en el planeta, de modo que la tecnologa informtica debe proporcionar una conectividad sin restricciones a cada tipo de usuario trabajadores, contratistas, invitados e incluso clientes apropiada para la funcin de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es slo para el beneficio propio del usuario y de la productividad. La migracin hacia la movilidad genera varias ventajas en TI. Descrguese este documento tcnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sar tutto concentrato sulla mobilit. Gi nel 2013 nel mondo ci sono pi dispositivi mobili che persone, e l'IT deve fornire una connettivit senza interruzioni ad ogni tipo di utente dipendenti, appaltatori, ospiti e persino clienti che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E cos, la mobilit sul posto di lavoro non giova solo agli utenti e alla produttivit. La migrazione verso la mobilit genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a mobile first strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
    
Box
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understandingand Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen hnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich auerhalb der Festung befinden, nicht mehr untersttzen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lsungen umgesehen, die diese Technologien heute sichern knnen und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verndern.
Tags : 
    
CA Technologies EMEA
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Mobility Helps Enterprises Enter a New Age
Tags : 
entrust, mobile, mobility, secure mobile assets, mobile devices, mobile device security, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Know the truth: Mobile devices more secure than traditional PCs
Tags : 
entrust, mobile devices, mobile, security, mobile security, mobile perception
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrusts latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : 
entrust, security, mobile security, infographic, malware, mobile devices
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.