secure mobile

Results 1 - 25 of 222Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security
    
Commvault
Published By: Samsung     Published Date: Dec 18, 2015
This paper will examine seven steps for developing a current, secure, and well-managed mobile app portfolio.
Tags : 
    
Samsung
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 23, 2014
Download the Cisco Mobility Solution Overview to get information on providing highly secure mobile access anytime, anywhere, building a unified platform for mobile applications, and improving relationships with customers and employees through new mobile experiences.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The United States educational system is in the midst of transformational change due to widespread adoption of technologies, including video, mobile devices, and cloud services. Given the enormous potential of these technologies to improve educational outcomes, increase access to information and collaboration, and reduce costs, schools and libraries across the nation want to do more, not less, with technology.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The need for high-throughput wireless access was especially acute at Ligonier Valley High School, where hundreds of students, especially those in math and science classrooms located in one wing of the building, vied for simultaneous wireless connectivity to applications such as Larson Math and Science and the ALEKS one-on-one instructional system. Whether in the math and science wing or other areas of the school, bandwidth-intensive streaming video, multicast within classrooms, is common.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
As education evolves, so does the way we teach and learn. This report focuses on one of the newest trends, still in its nascent stages—mobile learning. It describes the potential benefits of mobile learning, addresses the challenges and opportunities that introducing mobile learning presents, and provides examples from school districts that have already implemented mobile learning programs so we can learn from their best practices. The report also suggests key points to consider as you develop your plans, align your goals, and make decisions regarding mobile learning in your schools.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The technology that powers organizations has undergone several major transitions since the birth of computing. In the 1960s, the mainframe was the dominant compute model, and it gave way to minicomputing about a decade later. In the 1990s, businesses eventually shifted to PC-based computing in the client/server era. This model was eventually supplanted by Internet computing as the dominant compute model. Today, the technology industry finds itself in the midst of the most significant transition ever: the shift to mobile computing.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
With the right approach, you can combine the mobility of wireless with the performance of wired networks. To get up to speed on 802.11ac, we're providing an 802.11ac migration cheat sheet and webinar on-demand.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Be inspired by these mobility success stories by downloading these case studies: • Pinellas County Integrates Wired and Wireless Networks • Cisco Meraki Architecture Construction - C&S Companies • Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution • Cisco CMX Connects Evergreen Brickworks Video
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: VMware AirWatch     Published Date: Jul 21, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware AirWatch
Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Gigamon     Published Date: Oct 25, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: Dell     Published Date: Feb 02, 2015
Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how the new Windows addresses today's workforce needs by enhancing mobile productivity, end-to-end security, and addresses virtualization and management advancements.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft, business, management, compare
    
Dell
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.
Tags : 
cloud, pulse secure, security, wireless, mobile access, data center
    
PulseSecure
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.