android phone

Results 1 - 23 of 23Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: ESET     Published Date: Sep 07, 2011
Learn valuable tips and techniques to fully protect your smartphone against security threats.
Tags : 
eset, gemini trojan, android phone, apps, security, threats, smartphone, applications
    
ESET
Published By: Citrix Systems     Published Date: Sep 06, 2013
A technical how-to guide— updated for Android 4.2, iOS 6.1, and Windows Phone and Surface 8.
Tags : 
citrix, apple ios, enterprise information, smartphones, enterprise computing
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 27, 2014
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, apple, android, byod, tablet, mobile, citrix byod, microsoft windows tablets
    
Citrix Systems
Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos
Published By: Zebra Technologies (Bulldog)     Published Date: Nov 17, 2016
Android is transforming the workplace, from the factory floor and the warehouse, to the health centre and the chic fashion boutique. As the world’s most popular operating system – favored by more than 80% of smartphone users worldwide1 – it’s familiar and easy to understand. And with Zebra Mobility DNA, together with the hardened security provided by built-in Zebra Mx Technology, Android is even tougher and more versatile. Download this white paper to learn more!
Tags : 
    
Zebra Technologies (Bulldog)
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android, iphone, regulatory compliance
    
IBM MaaS360
Published By: BlackBerry     Published Date: Mar 11, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security of enterprise grade mobility, blackberry, total cost of ownership, major mobile platforms
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security, enterprise grade mobility, blackberry, blackberry 10, enterprise
    
Blackberry
Published By: appia     Published Date: Jan 21, 2014
Behind every successful app is a great user acquisition strategy. In our whitepaper, Four Tips for Driving Mobile Advertising Success, learn four essential tactics creating successful mobile advertising program.
Tags : 
appia, mobile marketing, mobile targeting, localization, tracking, app marketing, iphone, blackberry
    
appia
Published By: Citrix     Published Date: Dec 09, 2013
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : 
enterprise information, secure, android, apple ios, microsoft window tablets, flexibility
    
Citrix
Published By: Localytics     Published Date: Jul 18, 2014
In this 29-page eBook, written for people new to app marketing, you'll learn how to run app marketing campaigns that increase engagement, ROI and lifetime value.
Tags : 
app marketing, mobile marketing, app marketing guide, mobile marketing guide, market an app, push messaging, push marketing, in-app messaging
    
Localytics
Published By: Localytics     Published Date: Jul 18, 2014
In this 23-page eBook, written for people new to app analytics, you'll learn what you need to know to start improving your app.
Tags : 
app analytics, mobile analytics, app analytics tools, app analytics guide, app monetization, user value, user acquisition, user conversion
    
Localytics
Published By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : 
cyber security, lookout, smartphone, tablet, mobile
    
Lookout
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.