Device EmployeeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Employee returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Endpoint Security
 •   Wireless Security
 •   Network Security
 •   Data Security
 •   Laptops/ Notebooks/ Tablet PCs
 •   Application Security
 •   Unified Communications / Voice & Data Convergence
 •   Security Policies

Related Searches
 •   Code Device Employee
 •   Communication Device Employee
 •   Device Contacts
 •   Device Employee Directory
 •   Device Employee Recovery
 •   Device Employee Rfq
 •   Device Employee Types
 •   Device Industry
 •   Device Issues
 •   Device Statements
Advertisement

ALL RESULTS
1 - 25 of 427 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by IronKey

May 26, 2009 - (Free Research)
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Social Business Podcast Series by IBM

November 16, 2011 - (Free Research)
A Social Business enables its employees – and customers – to more easily find the information and expertise they seek. Access this podcast series for an in-depth guide to establishing a Social Business for real-time communication and collaboration. 
(PODCAST)

Mobile Device Management Checklist by BlackBerry

December 22, 2011 - (Free Research)
This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy. 
(EGUIDE) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 21, 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 09, 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.

August 23, 2011 - (Free Research)
Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk. 
(WHITE PAPER) READ ABSTRACT |

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This informative whitepaper explores the role of network security in an increasingly mobile workplace and what you can do to enhance employee productivity. 
(WHITE PAPER) READ ABSTRACT |

BYOD – who carries the can? by ComputerWeekly.com

June 17, 2013 - (Free Research)
Rob Bamforth and Clive Longbottom offer advice on balancing the risks and rewards of bring your own device (BYOD). 
(ANALYST REPORT) READ ABSTRACT |

How to control abuse of social networking on mobile devices by ComputerWeekly.com

November 25, 2010 - (Free Research)
The numbers of employees using some form of mobile technology while working has soared. The benefits to the organisation are well documented; employees are more contactable, will probably extend their working days and should be more productive. 
(WHITE PAPER) READ ABSTRACT |

Delivering corporate data securely on employee iPads by Citrix

July 27, 2011 - (Free Research)
The growth of the iPad has resulted in deep security challenges for IT administrators across a variety of industries. Take a look at this resource to learn how to implement security policies and processes tailored for employee-owned tablet devices, including the iPad. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Physical Security Awareness and Smartphone Security Policy by Kensington

February 13, 2012 - (Free Research)
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee. 
(EGUIDE) READ ABSTRACT |

Legacy Tools: Not Built for Today's Helpdesk by LogMeIn, Inc.

September 16, 2009 - (Free Research)
This paper explores the challenges of supporting a remote workforce with legacy tools and the hidden costs of these tools. In addition, it identifies best practices that decision makers can use to choose enterprise helpdesk support tools that better meet the needs of remote employees, while helping to cut costs. 
(WHITE PAPER) READ ABSTRACT |

Bring Your Own iPad to Work by Aruba Networks, Inc.

March 10, 2011 - (Free Research)
Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office. 
(WHITE PAPER) READ ABSTRACT |

Taking Your Enterprise Mobile: The Executive Checklist by Zenprise

July 31, 2012 - (Free Research)
With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information. 
(WHITE PAPER) READ ABSTRACT |

End-to-End Mobile Device Management by Zenprise

March 08, 2012 - (Free Research)
Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Five Things You Must Do Before Letting Your Employees Work From Anywhere by Dell, Inc. and Intel®

July 13, 2012 - (Free Research)
This presentation transcript explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Embracing Employee-Acquired Smartphones without Compromising Security by BlackBerry

September 12, 2011 - (Free Research)
More and more users are using their own smartphones at work – and it’s crucial that IT departments have a clearly defined  strategy for dealing with these devices. BlackBerry Enterprise Server Express is a cost-effective solution to help IT manage the challenges of security, cost and IT control while balancing the needs of employees. 
(WHITE PAPER) READ ABSTRACT |

Smartphones: A Savvy Strategy for Government Employees by BlackBerry

January 11, 2011 - (Free Research)
There is no reason why government agencies shouldn’t take advantage of all that smartphones have to offer. Employed efficiently, smartphones can address several organizational imperatives, including cost savings, greater mobility, increased telework options and sensitivity to environmental concerns. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by Aerohive Networks

May 23, 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK)

The New Workplace: Supporting Bring your own device by IBM

November 30, 2012 - (Free Research)
This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 18 March 2014: Boost productivity with collaboration technology by ComputerWeekly.com

March 18, 2014 - (Free Research)
In this week's Computer Weekly, we hear from IT leaders improving collaboration and productivity for employees by using technologies such as unified communications and social media. We report from Mobile World Congress on the latest trends. And we examine how mobile device management tools can help build a trusted BYOD policy. Read the issue now 
(EZINE) READ ABSTRACT |

Ponemon Global Study on Mobility Risks by Websense, Inc.

February 01, 2012 - (Free Research)
With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them. 
(WHITE PAPER) READ ABSTRACT |

Centralized Management Key to Controlling Mobile Communications Cost by Digital Fairway, Inc.

November 2007 - (Free Research)
In this paper, learn why centralized policy management, automated order processing and asset management, and end-user self-service are key ingredients for any organization trying to control the proliferation of wireless mobile devices and spiraling costs. 
(WHITE PAPER) READ ABSTRACT |

Bringing Order to the Chaos of “Bring Your Own Device” by Enterasys

April 2012 - (Free Research)
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this. 
(WHITE PAPER) READ ABSTRACT |

Making the Most of BYOD Opportunities by Dell and VMware

April 2013 - (Free Research)
Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 427 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts