mobile phone

Results 351 - 368 of 368Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management, business technology
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Seeing an opportunity to help its customers and local distributors, TFC worked with BlackBerry® Alliance Elite Member FloatPoint Media Inc. to develop the custom iGasketT app. The result? Improved user safety and a wider worldwide market.
Tags : 
blackberry, mobile applications, application development, case study, business technology
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Get the details on how BlackBerry Mobile Fusion can make managing mobile devices - including those running Apple iOS and Google Android operating systems faster, easier and safer than ever.
Tags : 
byod, bring your own device, blackberry, mobile device, managing mobility, managing enterprise mobility, smartphones, mobile device management, business technology
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Whether you are a seasoned pro at developing apps or have little to no experience, these simple apps are easy to build, simple to deploy, and powerful enough to add tremendous value and productivity to your organization.
Tags : 
applications, apps, mobile apps, mobile applications, smartphones, application development, business technology
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry
Published By: Brainshark     Published Date: Oct 16, 2013
Why use video? This video explains. Find out how businesses are using video across the enterprise today.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Published By: Brainshark     Published Date: Oct 21, 2013
Mobile, video and social media are growing rapidly - but not independently. This video takes a look at the relationships between each trend, and how your business can capitalize on all three to advance your communications strategy.
Tags : 
business communications, training, b2b, b2c, customer engagement, marketing, mobility, mobile, smartphone, on-demand, presentation, productivity, video communications, training, powerpoint, ppt, presentation, byod, social media, video
    
Brainshark
Published By: Oracle     Published Date: Oct 25, 2013
Learn how to provide the same experience across all devices and avoid the need for duplicate data entry, which might limit access to customer data or create errors.
Tags : 
leverage, mobility, sales, customer data, data, devices, mobile, tablet, smart phone, laptop, relationship management, sales, business technology
    
Oracle
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft, it management
    
Globalscape
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Windows-Anwendungen und -Desktops gehören zur Kernausstattung moderner Unternehmen, auch wenn mobile Plattformen, Smartphones und Tablets heute überall zu finden sind. Im Unterschied zu den Architekuren der mobilen Infrastruktur hat sich die Desktop- Infrastruktur seit vielen Jahren kaum weiterentwickelt. Aber jetzt ist der Zeitpunkt für die Desktop- Transformation gekommen.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Les postes de travail et applications Windows sont des éléments vitaux pour l’entreprise encore aujourd’hui, malgré l’adoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail n’ont pas su évoluer au fil des ans. L’heure de la transformation du poste de travail a sonné.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Published By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
    
U.S. Cellular
Published By: Jamf     Published Date: Nov 05, 2018
There are no signs of Apple device growth slowing down in the enterprise. In fact, 3 out of 4 employees now choose an iPhone or iPad for their mobile device. Our guideon the basics of device management will help you enhance iPhone, iPad and iOS management skills by providing you with: • An introduction to iPhone, iPad and iOS management • Explanation of Apple services and programs available • Outline of lifecycle management stages • Insight for infrastructure planning • Overview of the industry-leading Apple management solution
Tags : 
    
Jamf
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : 
cyber security, lookout, smartphone, tablet, mobile
    
Lookout
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15     Next   End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.