Device EmployeeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Employee returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Endpoint Security
 •   Data Security
 •   Wireless Security
 •   Network Security
 •   Laptops/ Notebooks/ Tablet PCs
 •   Security Policies
 •   Application Security
 •   Data and Application Distribution

Related Searches
 •   Device Employee Documents
 •   Device Employee Graph
 •   Device Employee Iowa
 •   Device Employee Montana
 •   Device Flow
 •   Device Top
 •   Function Device
 •   Production Device Employee
 •   Standards Device Employee
 •   Workflow Device Employee
Advertisement

ALL RESULTS
1 - 25 of 411 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by IronKey

May 26, 2009 - (Free Research)
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Social Business Podcast Series by IBM

November 16, 2011 - (Free Research)
A Social Business enables its employees – and customers – to more easily find the information and expertise they seek. Access this podcast series for an in-depth guide to establishing a Social Business for real-time communication and collaboration. 
(PODCAST)

Mobile Device Management Checklist by SearchSecurity.com

December 22, 2011 - (Free Research)
This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy. 
(EGUIDE) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 21, 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 09, 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.

August 23, 2011 - (Free Research)
Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk. 
(WHITE PAPER) READ ABSTRACT |

Tablets and Smartphones in the Enterprise: Risks and Management Concerns by SearchSecurity.com

August 21, 2012 - (Free Research)
This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time. 
(EBOOK) READ ABSTRACT |

E-Guide: Physical Security Awareness and Smartphone Security Policy by SearchSecurity.com

February 13, 2012 - (Free Research)
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee. 
(EGUIDE) READ ABSTRACT |

BYOD – who carries the can? by ComputerWeekly.com

June 17, 2013 - (Free Research)
Rob Bamforth and Clive Longbottom offer advice on balancing the risks and rewards of bring your own device (BYOD). 
(ANALYST REPORT) READ ABSTRACT |

How to control abuse of social networking on mobile devices by ComputerWeekly.com

November 25, 2010 - (Free Research)
The numbers of employees using some form of mobile technology while working has soared. The benefits to the organisation are well documented; employees are more contactable, will probably extend their working days and should be more productive. 
(WHITE PAPER) READ ABSTRACT |

Legacy Tools: Not Built for Today's Helpdesk by LogMeIn, Inc.

September 16, 2009 - (Free Research)
This paper explores the challenges of supporting a remote workforce with legacy tools and the hidden costs of these tools. In addition, it identifies best practices that decision makers can use to choose enterprise helpdesk support tools that better meet the needs of remote employees, while helping to cut costs. 
(WHITE PAPER) READ ABSTRACT |

Delivering corporate data securely on employee iPads by Citrix

July 27, 2011 - (Free Research)
The growth of the iPad has resulted in deep security challenges for IT administrators across a variety of industries. Take a look at this resource to learn how to implement security policies and processes tailored for employee-owned tablet devices, including the iPad. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by SearchSecurity.com

May 23, 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK)

Managing the iPad in the Enterprise by SearchSecurity.com

December 13, 2011 - (Free Research)
This Tech Guide discusses mobile strategies in the enterprise: manageability, cost, business benefits and - most important - how employees are dictating the need for it. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to Create a Mobile Security Policy by SearchSecurity.com

October 09, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices. 
(EGUIDE) READ ABSTRACT |

Choosing & Managing Mobile Devices - Ch.1: Avoiding Challenges in Mobile Device Management by SearchSecurity.com

March 01, 2013 - (Free Research)
The rapidly evolving BYOD trend is making management strategies harder and harder to follow through on. Read this expert whitepaper to examine the critical data security and employee-related challenges IT faces with attempting to manage mobile devices. 
(WHITE PAPER) READ ABSTRACT |

October Essentials Guide on Mobile Device Security by SearchSecurity.com

October 09, 2012 - (Free Research)
The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Bring Your Own iPad to Work by Aruba Networks, Inc.

March 10, 2011 - (Free Research)
Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office. 
(WHITE PAPER) READ ABSTRACT |

Taking Your Enterprise Mobile: The Executive Checklist by Zenprise

July 31, 2012 - (Free Research)
With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information. 
(WHITE PAPER) READ ABSTRACT |

End-to-End Mobile Device Management by Zenprise

March 08, 2012 - (Free Research)
Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need. 
(WEBCAST) READ ABSTRACT |

Embracing Employee-Acquired Smartphones without Compromising Security by BlackBerry

September 12, 2011 - (Free Research)
More and more users are using their own smartphones at work – and it’s crucial that IT departments have a clearly defined  strategy for dealing with these devices. BlackBerry Enterprise Server Express is a cost-effective solution to help IT manage the challenges of security, cost and IT control while balancing the needs of employees. 
(WHITE PAPER) READ ABSTRACT |

Smartphones: A Savvy Strategy for Government Employees by BlackBerry

January 11, 2011 - (Free Research)
There is no reason why government agencies shouldn’t take advantage of all that smartphones have to offer. Employed efficiently, smartphones can address several organizational imperatives, including cost savings, greater mobility, increased telework options and sensitivity to environmental concerns. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences! by SearchSecurity.com

March 13, 2012 - (Free Research)
This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices. 
(EBRIEF) READ ABSTRACT |

How Consumerization Affects Security and Compliance by SearchSecurity.com

February 29, 2012 - (Free Research)
The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels. 
(EBRIEF) READ ABSTRACT |

Bringing Order to the Chaos of “Bring Your Own Device” by Enterasys

April 30, 2012 - (Free Research)
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 411 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts