BeyeNETWORK business intelligence and data warehousing resources

Research Library

IT Agents  >  IT Workforce  >  
Mobile Workers
SEE: Related Topics

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:

1 - 15 of 951 Matches
sponsored by Cisco Systems, Inc.

WEBCAST - This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks.
Posted: April 22, 2014 | Premiered: April 22, 2014

Get This Now
Topics:  Data Security | Email | Email Encryption | Email Security | Email Security Services | Email Threats | Malware | Mobile Workers | Security | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Systems | Security Threats

Cisco Systems, Inc.


sponsored by Cisco Systems, Inc.

WEBCAST - Watch this webcast to see how you can best protect your assets accessible by the Web with a strong protection solution that ensures security wherever your data goes.
Posted: April 22, 2014 | Premiered: April 22, 2014

Get This Now
Topics:  Cybersecurity | Hackers | Malware | Mobile Workers | Network Monitoring | Network Security | Risk Management | Security | Security Management | Security Managers | Security Spending | Security Systems | Security Threats | TCO

Cisco Systems, Inc.


sponsored by Imprivata

WEBCAST - This webcast, hosted by Ed Ricks, CIO of Beaufort Memorial Hospital, explains the compliance concerns with clinician text messaging, and shares Beaufort's experience implementing a secure, compliant solution that was able to reduce time wasted using communication technologies.
Posted: April 22, 2014 | Premiered: April 22, 2014

Get This Now
Topics:  Compliance (Systems Operations) | Data Security | EHR (Electronic Health Records) | Health Care Compliance | Health Care Industry | Health Care Security | HIPAA | Mobile Workers | Unified Messaging | Unified Messaging Systems

Imprivata


sponsored by Lumension

WHITE PAPER - This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: April 21, 2014 | Published: April 21, 2014

Get This Now
Topics:  Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile IP | Mobile Middleware | Mobile Payments | Mobile Workers | Security | Security Architectures | Security Best Practices | Security Infrastructure | Security Management | Security Threats

Lumension


sponsored by Webroot

WHITE PAPER - This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Posted: April 18, 2014 | Published: October 31, 2013

Get This Now
Topics:  Cloud Security | Cybersecurity | Endpoint Security | Hackers | Malware | Mobile Device Management | Mobile Workers | Security Architectures | Security Infrastructure | Security Policies | Security Threats

Webroot


sponsored by Apptix

WHITE PAPER - This informative white paper examines an MDM solution designed to improve mobile performance and reduce risk all while cutting costs.
Posted: April 18, 2014 | Published: April 18, 2014

Get This Now
Topics:  Content Delivery | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile IP | Mobile Middleware | Mobile Payments | Mobile Workers | Smart Phones | Tablet PC

Apptix


sponsored by Aruba Networks

WHITE PAPER - This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Posted: April 18, 2014 | Published: April 18, 2014

Get This Now
Topics:  Application Security | Authentication | Authorization | Mobile Device Management | Mobile Workers | Network Security | Risk Management | Security | Security Management | Security Managers | Security Policies | Smart Phones

Aruba Networks


sponsored by ZixCorp

WHITE PAPER - This exclusive resource discusses key policy considerations for CIOs who want to design and launch a successful BYOD program.
Posted: April 18, 2014 | Published: April 18, 2014

Get This Now
Topics:  Content Delivery | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile IP | Mobile Middleware | Mobile Payments | Mobile Workers | Smart Phones | Tablet PC

ZixCorp


sponsored by Sophos, Inc.

WHITE PAPER - This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: April 18, 2014 | Published: April 18, 2014

Get This Now
Topics:  Cloud Computing | Cloud Security | Data Security | Encryption Standards | Endpoint Security | Mobile Workers | Risk Management | Security | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Spending | Security Systems

Sophos, Inc.


sponsored by TigerText, Inc.

WHITE PAPER - This resource offers tips on how to choose a text messaging vendor that offer secure and compliant functionality for use in the workplace.
Posted: April 18, 2014 | Published: December 31, 2013

Get This Now
Topics:  Authentication | Authorization | Compliance (Systems Operations) | Compliance Audits | EHR (Electronic Health Records) | Endpoint Security | Health Care Compliance | Health Care Industry | Health Care Security | HIPAA | Mobile Device Management | Mobile Workers | Sarbanes-Oxley Act of 2002 | Sarbanes-Oxley Compliance | Smart Phones | Unified Messaging | Unified Messaging Systems

TigerText, Inc.


sponsored by TigerText, Inc.

WHITE PAPER - In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Posted: April 17, 2014 | Published: December 31, 2013

Get This Now
Topics:  Compliance (Systems Operations) | Data Security | EHR (Electronic Health Records) | Health Care Compliance | Health Care Industry | Health Care Security | HIPAA | Messaging Middleware | Messaging Security | Mobile Workers | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Policies

TigerText, Inc.


sponsored by Workday

VIDEO - In this brief video, hear from real-world users -- including CareFusion, Chiquita Brands, and Community Health Services of Georgia -- of a mobile enterprise resource planning (ERP), financials, and human capital management (HCM) technology to explore the benefits they experience from mobile apps.
Posted: April 17, 2014 | Premiered: September 25, 2013

Get This Now
Topics:  ERP | ERP Software | Financial Applications Software | Human Resources Software | Mobile Workers | Workforce Management Software

Workday


sponsored by Aruba Networks

WHITE PAPER - This informative white paper discusses how, with a little upfront planning and some smart technology, you can significantly improve the quality of your users' mobile application experience on corporate Wi-Fi networks.
Posted: April 17, 2014 | Published: April 16, 2014

Get This Now
Topics:  Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile IP | Mobile Middleware | Mobile Payments | Mobile Workers | Network Management | Wi-Fi | Wireless Networks

Aruba Networks


sponsored by Aruba Networks

WHITE PAPER - This informative paper examines the steps your business can take to build your wireless network into an enterprise asset for the mobile workforce.
Posted: April 16, 2014 | Published: April 16, 2014

Get This Now
Topics:  Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile IP | Mobile Middleware | Mobile Payments | Mobile Workers | Network Management | Wi-Fi | Wireless Networks

Aruba Networks


sponsored by RSA, The Security Division of EMC

WHITE PAPER - This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: April 16, 2014 | Published: December 31, 2012

Get This Now
Topics:  Business Continuity Planning | Business Intelligence | Compliance (Systems Operations) | Compliance Best Practices | Cybersecurity | Governance, Risk, Compliance (GRC) | Information Governance | Mobile Workers | Risk Management | Security | Security Policies

RSA, The Security Division of EMC


1 - 15 of 951 Matches


Partner with Us
Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics |
Business Intelligence Network Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com