Whitepaper Library
 

android

Results 1 - 25 of 120Sort Results By: Published Date | Title | Company Name
Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing
    
Harry lei
Published By: VMware AirWatch     Published Date: Jul 19, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware AirWatch
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
10 Dinge, die IT-Administratoren zu ANDROID for Work wissen müssen.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
10 POINTS que tout administrateur doit connaître ANDROID FOR WORK.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: MobileIron     Published Date: May 12, 2015
Here are ten things IT administrators need to know about Android for work. Suggestions for maximizing effectiveness of a BYOD office environment.
Tags : 
android for work, it administrators, byod, office environment, mobile security
    
MobileIron
Published By: MobileIron     Published Date: May 12, 2015
This white paper will provide a technical overview as well as recommendations for IT organizations looking to accelerate Android adoption.
Tags : 
    
MobileIron
Published By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas, mdm, client management
    
IBM APAC
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers powered by Intel® Xeon® Platinum processor with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: MobileIron     Published Date: Apr 22, 2014
Learn how BYOD drives the mobile enterprise transformation
Tags : 
mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone, android
    
MobileIron
Published By: MobileIron     Published Date: Apr 22, 2014
Download this white paper to learn how mobile technology is forcing a global enterprise transformation.
Tags : 
mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone, android
    
MobileIron
Published By: MobileIron     Published Date: Jul 03, 2014
Every year Gartner evaluates the enterprise mobility management vendors on their completeness of vision and ability to execute. This criteria is used to place vendors into one of four quadrants. For the fourth consecutive year MobileIron has been placed in the Leaders quadrant. According to Gartner, "The hallmark of leaders is that they focus and invest in their offerings to the point that they lead the market and can affect its overall direction." Download to learn more!
Tags : 
mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone, android
    
MobileIron
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: VMware     Published Date: Jul 24, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware
Published By: Lookout     Published Date: Dec 09, 2016
Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : 
risks, mobile technology, enterprise, ios, android, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Applause     Published Date: Jul 14, 2017
Learn tips, techiques and trends for launching great digital experiences that delight your users in our free guide.
Tags : 
mobile app testing, mobile applications, mobile application testing, software testing, functional testing, usability testing, usability studies, security testing, localization testing, device fragmentation, native apps, quality assurance, applause, android app testing, ios app testing
    
Applause
Start   Previous   1 2 3 4 5    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.