Whitepaper Library
 

mobile network

Results 1 - 25 of 294Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Enterprises are looking to innovations like big data, cloud-based services and mobile apps to improve decision making and accelerate business results. But legacy IT implementations—independent compute, storage and networking platforms, veneered with a hypervisor— often can’t deliver on the increased agility, scalability and price performance demands of this new era of IT.
Tags : 
information technology, networking platforms, return on investment, cloud-based services, mobile apps
    
Hewlett Packard Enterprise
Published By: Zoom     Published Date: May 15, 2015
This is a case study about a proactive approach to protect mobile devices and networks for individuals, businesses and governments.
Tags : 
    
Zoom
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: Samsung     Published Date: Dec 18, 2015
Download this infographic to see why with increasing adoption of mobile banking, banks must take a “mobile-first” approach to their branch networks
Tags : 
    
Samsung
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 18, 2015
This paper illustrates how organisations are becoming digital enterprises due to the technology implications of scale and volume.
Tags : 
technology, digital economy, network, become a digital enterprise, mobile, social, cloud, big data, digital enterprise, digital infrastructure, equinox, hybrid infrastructure, equinix solutions, optimise your network, digital world challenges, networking, byod, infrastructure, network architecture, virtualization
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
Changes in where traffic originates and how much data is generated will soon have profound effects on Internet latency and end-user quality of experience.
Tags : 
data, generate data, host applications, ensure optimal performance, devices, mobile data, mobility, data traffic, data center, network, equinix, equinix solutions, network management, network performance
    
Equinix
Published By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
    
Gigamon
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Social, Mobile, Analytics and Cloud (SMAC), have broad potential to provide huge business value, while simultaneously presenting potentially overwhelming challenges. The rapid technology changes supporting SMAC and the overall complexity involved demand a systematic approach to building out your SMAC capability.
Tags : 
collaborative consulting, creating opportunities, driving disruption, social, mobile, analytics, cloud, infrastructure, elastic computing capacity, cloud computing, social network, mobile web, wireless data networks, drive change
    
Collaborative Consulting
Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.
Tags : 
mobile productivity, mobile access, security, connectivity, byod, corporate network, networking
    
PulseSecure
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, cloud computing
    
CA Technologies
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless, classroom, media-rich apps, school
    
Ruckus Wireless
Published By: MobileIron     Published Date: Apr 20, 2015
A case study of how MobileIron Core, App@Work, and app delivery network technologies have been leveraged to augment and support ShiSeiDo operations. Study is in Japanese.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
Angesichts der Geschwindigkeit, mit der Unternehmen auf Mobiltechnik umsteigen, muss man statt von einer Entwicklung schon eher von einem globalen Wandel sprechen. Unter Berücksichtigung der Tatsache, wie schnell Benutzer und Unternehmen von PCs auf Mobilgeräte umsatteln, prognostizierte IDC, dass der Absatz von PCs 2013 auf ein Rekordtief fallen würde.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
Diese Anleitung beschreibt nicht nur, wie Enterprise Mobility Management funktioniert, sondern zeigt auch an einem typischen Implementierungsbeispiel, wie ein Unternehmen die Einführung plant und alle Teile einer EMM-Lösung verwaltet. Diese Anleitung enthält einen detaillierten Bereitstellungsprozess unter Verwertung der gesammelten Erfahrungen und Empfehlungen zur Suche nach dem richtigen EMM-Anbieter und Schritt für Schritt umsetzbare Erkenntnisse aus der Praxis, die jedem Unternehmen bei der Umwandlung zum Mobile-First-Unternehmen helfen können.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
En plus de décrire le fonctionnement de l’EMM, ce guide livre également une implémentation type en expliquant comment une organisation s'y prend pour déployer et gérer tous les éléments d'une solution EMM. En donnant un processus détaillé de déploiement des bonnes pratiques ainsi que des recommandations pour identifier le bon fournisseur EMM, ce guide propose des informations pratiques et des procédures qui permettront à toute organisation d'accélérer la transition vers une entreprise Mobile First.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce, enterprise networks, sensitive documents, productivity ecosystem, lockdown, document solutions, cloud, cloud-based, hybrid it, enterprise mobility, networking, virtualization, cloud computing
    
Adobe
Published By: MobileIron     Published Date: Apr 13, 2015
THV Group, a Belgian company, is a worldwide market leader in replacement parts and accessories for material-handling industrial and agricultural equipment, new and second-hand forklifts, aerial platforms and internal handling equipment. With MobileIron, TVH launched a successful Bring Your Own Device (BYOD) program, built an enterprise app store that gives employees easy access to productivity apps, and automated the process of giving employees and guests the right level of mobile network access.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device, distributed computing, infrastructure, network security, remote access, remote network management, cloud computing
    
Symantec.cloud
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.