> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 426 - 450 of 1256Sort Results By:Published Date | Title | Company Name
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
ibm, retail, mobile device management, data security, android
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Get the latest mobile devices and apps in the hands-off learners and educators quickly and securely with mobile device and app management.
Tags : 
ibm, mobile, device management, education, app management
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ibm, fiberlink, maas360, apple, ios
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
ibm, fiberlink, maas360, gartner, enterprise
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
ibm, fiberlink, maas360, forrester, mobile
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
ibm, mobile, content management, mcm, aragon research
    
IBM MaaS360
White Paper Published By: IBM     Published Date: Oct 06, 2015
This Edison Group study provides an overview of three of the market leading MADPs -- IBM, SAP and Koney -- and discusses how they compared them using a real-world use case.
Tags : 
networking, it management, business technology, telecom
    
IBM
Webinar Published By: IBM     Published Date: Oct 06, 2015
Do you know how your mobile apps stack up -- with users and against other apps?
Tags : 
networking, it management, business technology
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
ibm, cloud, analytics, mobile, social
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
An infographic highlighting the key points of Saugatuck Technology's research, which studied the importance of sourcing in hybrid IT environments.
Tags : 
ibm, saugatuck, hybrid it, hybrid it environments, saugatuck technology
    
IBM
White Paper Published By: Cisco     Published Date: Oct 06, 2015
Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
email response, mobility, web chat, collaboration, management
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 06, 2015
Learn how Cisco combines the power of Cisco Collaboration Cloud with the versatile toolbox of Cisco Unified Contact Center Express (Unified CCX) to provide multiple channels for customer engagement.
Tags : 
cisco, cisco collaboration cloud, customer care, unified ccx, customer engagement
    
Cisco
Webinar Published By: Cisco     Published Date: Oct 06, 2015
Hear more about how Customer Engagement has evolved from 'carbon based interaction' (live contact centers) to 'silicon based interaction' (self service applications and communities), and how this is quickly becoming the new recipe for customer engagement success.
Tags : 
customer engagement, cisco, self service application, customer engagement success, contact centers
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 06, 2015
Read more to learn how The Virtual Expertise business offer delivers a consistent, interactive experience that increases upsell/cross sell, improve expert productivity, and increases customer loyalty.
Tags : 
cisco, virtual expertise, expert productivity, interactive experience, crm
    
Cisco
White Paper Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps you’ve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization aren’t compelling enough reasons, data center security should be. To manage today’s coordinated and persistent security threats, which often come from within, data centers need to implement “Zero Trust” networking. Virtualization puts it within your reach. Discover why — download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx
    
VMware
White Paper Published By: Viavi Solutions     Published Date: Sep 30, 2015
Each enterprise has its own reasons for moving to virtual infrastructure, but the common benefit is better and more efficient server utilization. Ensure comprehensive visibility with three practical steps highlighted in this white paper.
Tags : 
server virtualization visibility, virtual infrastructure, server utilization, virtualization, viavi
    
Viavi Solutions
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.