bring your own device security

Results 26 - 50 of 51Sort Results By: Published Date | Title | Company Name
By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility
     Enterprise Mobile
By: Enterprise Mobile     Published Date: Sep 30, 2013
: Interested in knowing what CIOs and other IT executives really think about the future of enterprise mobility? Enterprise Mobile uncovers the results of a survey conducted to assess the business impact of enterprise mobility based on input from technology leaders. The webinar provides tips to prepare for the future of enterprise mobility, secrets to removing barriers to mobile strategy implementation, and shares trends around how other companies are embracing mobile security.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
     Enterprise Mobile
By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
     Enterprise Mobile
By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : citrix, information security, desktop virtualization, virtualization, it management
     Citrix Systems
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
     CDW
By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device
     VMware, Inc
By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : network management, network security, network security appliance, security, security architecture
     Juniper Networks
By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
     AWS
By: Sophos     Published Date: Jul 01, 2013
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models. This whitepaper explains the risks and rewards of BYOD, and shows you how you can adopt BYOD in your workplace while protecting your data.
Tags : risk, rewards, byod, security
     Sophos
By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : sap, mobile, managing, business, mobility, technology
     SAP
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security
     CDW-Trend Micro
By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security
     IBM MaaS360
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications
     IBM
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
     IBM
By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
     Cisco
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
     HP - Enterprise
By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : byod, bring your own device, mobile device, education applications, education, security risk, security compliance, security
     HP - Intel®
By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : byod, healthcare, bring your own device, mobile devices, security risk, security compliance, security
     HP - Intel®
By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management
     Cisco
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : data security, byod, corporate security, mobile data security, user experience, security, it management, data management
     IBM MaaS360
By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : (delete)mobile management, system solutions, data security, software management, personal data management, device management
     IBM
Start   Previous    1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com