HIT Consultant Insightful coverage of healthcare innovation
 

mobile security

Results 401 - 425 of 775Sort Results By: Published Date | Title | Company Name
Published By: Imation Scalable Storage     Published Date: Apr 06, 2012
Learn how you can use data tiering to transform unstructured data into "content" while keeping protection high and costs low.
Tags : 
imation, tiering, data, recovery, scalable, scalable storage, protect, connect, store, retention, retrieval, recover, mobile security, consumer
    
Imation Scalable Storage
Published By: Imation Scalable Storage     Published Date: Apr 06, 2012
This introductory guide will help you find a solution that's right-sized for your business and your budget.
Tags : 
imation, tiering, data, recovery, scalable, scalable storage, protect, connect, store, retention, retrieval, recover, mobile security, consumer
    
Imation Scalable Storage
Published By: Imation Scalable Storage     Published Date: Apr 06, 2012
Learn why an Imation RDX solution is the perfect scalable solution for SMBs with limited resources.
Tags : 
smb, data protection, imation, tiering, data, recovery, scalable, scalable storage, protect, connect, store, retention, retrieval, recover, mobile security, consumer
    
Imation Scalable Storage
Published By: Imation Scalable Storage     Published Date: Apr 06, 2012
Learn how a tiered storage solution can help your business realize excellent reliability, protection and compliance in the face of extreme data growth.
Tags : 
imation, tiering, data, recovery, scalable, scalable storage, protect, connect, store, retention, retrieval, recover, mobile security, consumer
    
Imation Scalable Storage
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: CDW     Published Date: Jun 18, 2013
A mix of well-thought-out policies and up-to-date technologies are needed to protect critical data.
Tags : 
cdw, mobile security, protecting data, critical data. notebooks, smartphones, tablets
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security, printer security, automotive system security, aeronautical system security, pci dss, nerc, dynamic whitelisting, zero day attacks, mobile / wireless, network infrastructure, privacy and security
    
McAfee
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device, vdi
    
VMware, Inc
Published By: Cisco     Published Date: May 14, 2015
Depuis la naissance de l'informatique, la technologie a connu d'importantes évolutions. Dans les années 60, le modèle de calcul dominant reposait sur des unités centrales, lesquelles ont été remplacées une décennie plus tard par les mini-ordinateurs.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco has acknowledged the need to address our customers’ array of employee and consumer mobility requirements with a full set of mobility solutions.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
To leapfrog the competition, businesses must act immediately to capitalize on mobility.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
    
hightail
Published By: Microsoft Office 365     Published Date: May 10, 2016
We’ve pulled together the top five ways Office 365 helps provide the level of security your business needs. From Advanced Threat Protection to secure mobile devices, enterprise-level security from Office 365 is there each step of the way. We’ve made email security our priority, so you don’t have to make it yours. Learn how to secure your email — and your business — today.
Tags : 
    
Microsoft Office 365
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Stay ahead of risks inherent in modern connectivity, mobile integration and securing thermal barcode printers. This paper helps you leverage your IT know-how, by evaluating common security risks and tightening control with remote device management systems.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy, inventory accuracy, price management accuracy
    
Zebra Technologies
Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : 
mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky
    
Kaspersky
Published By: F5 Networks Inc     Published Date: Mar 23, 2015
A powerful but radically different version of the Web’s defining standard is coming soon and new research suggests many IT departments aren’t ready. While HTTP/2 enables dramatic improvements to both the speed and security of mission-critical Web applications, most companies are likely to find deploying it a complex and time-consuming task. An exclusive new survey from IDG Research reveals that large numbers of IT professionals know little about the new protocol or the technical challenges it can present and even fewer have a strategy in place for collecting HTTP/2’s considerable benefits without suffering its potential pitfalls.
Tags : 
http, web applications, mobile bandwidth, it security standards, mobile performance
    
F5 Networks Inc
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.