ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device Management Multimedia

  • Closing the Hacker's Open Door: Strengthening Mobile & App Security

    Sponsored by: IBM

    In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.

  • Mobile Security Matures: Managing the new mobile enterprise 2.0

    Sponsored by: SearchSecurity.com

    This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com provides attendees with strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.

  • MaaSter Office 365 Management with MaaS360

    Sponsored by: IBM

    Tune into this webcast to hear from 2 mobile experts, Chuck Brown and Jimmy Tsang as they reveal their tips and strategies on how to master the Microsoft Office 365 Management environment by leveraging MaaS360.

  • Cloud First Mobile First – Introducing Enterprise Mobility as a Service

    Sponsored by: Dimension Data

    This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.

  • Mobile App Security: All You Need to Know

    Sponsored by: Maas360 by IBM

    This webcast helps mobile application developers embed enterprise-grade security in their applications.

  • Apps to the Future: Predicting Enterprise Mobility in 2015

    Sponsored by: Maas360 by IBM

    This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.

  • Master the Mobile User Experience Classroom

    Sponsored by: SearchCIO.com

    This classroom will detail methods for understanding what needs to be created to meet demand of your target mobile audience , how to continuously improve your mobile application to improve the customer experience (CX) and how to approach the mobile application development process.

  • Envisioning and Enabling the Next Generation Enterprise

    Sponsored by: Jive Software

    This webcast covers what it takes to envision and enable a next generation enterprise by considering much of the new technology that is flowing through the market. Learn how the CIO must change and adapt to meet new technology pressures and ultimately, give way to the next generation enterprise.

  • A New Approach to Endpoint Data Protection for Mobile Enterprise

    Sponsored by: Druva Software

    Tune into this webinar to learn about a new approach to endpoint backup that takes cloud infrastructure and mobile enterprise into account.

  • Huge Healthcare Data Breaches: How to Halt the Hacking Proactively

    Sponsored by: Certes Networks

    This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.

  • Embracing BYOD with Mobile Device Management

    Sponsored by: IBM

    This exclusive webcast takes an in-depth look at how organizations are embracing BYOD corporate philosophy and how dynamic mobile device management can take your strategy to the next level. View now to learn more.

  • Learn why NSS Labs Recommends NetScaler AppFirewall

    Sponsored by: Citrix

    This exclusive webcast takes an in-depth look at application firewalls and includes a study of how one web application firewall (WAF) was able to toe the line and meet industry standards. Read on to learn more.

  • Mobile Applications: How to Stay Ahead of the Game

    Sponsored by: Hewlett-Packard Company

    This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.

  • Mobility: The New Standard for Engaging and Inspiring Better Business

    Sponsored by: Epicor Software Corporation

    The newest trends in mobile applications are being leveraged to enable more effective data analytics, stronger collaboration, faster decision making, and increased customer satisfaction. Watch this video to get Constellation research specialist R "Ray" Wong's advice.

  • Addressing IT Data Challenges in Today's Mobile World

    Sponsored by: CommVault

    In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.

  • Evaluating Secure File Sharing with Enterprise Mobility Management

    Sponsored by: Citrix

    This Gartner webcast discusses why EFSS is a critical component of your strategy to protect enterprise data, and how to integrate EFSS with other enterprise mobility management (EMM) components.

  • Modern Business Needs VDI to Soar

    Sponsored by: VCE

    Access this video to explore how VDI has changed over the years. Discover how a virtualization technology is partnering with a leading converged infrastructure solution to create a scalable, secure, high performing VDI solution and allowing for seamless transition into centrally managed, secure workspaces.

  • Welcome to the Age of End User Computing

    Sponsored by: VCE

    In this video, explore how VDI initiatives have changed over the years. Discover why now is the time to deploy VDI innovations by exploring the benefits and how converged infrastructures are combining with VDI to enhance the end-user computing environment for the mobile workforce.

  • Forrester on Addressing IT Challenges in Today's Mobile World

    Sponsored by: CommVault

    In this exclusive webcast, Rachel Dines, Senior Analyst, Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive. View now to learn more.

  • CSC MyWorkStyle: The Next Generation Workforce

    Sponsored by: CSC

    This exclusive webcast details a suite of mobile solutions that can solve key problems for EMM. Read on to learn more.

  • Security University: Mobile Security

    Sponsored by: SearchSecurity.com

    Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.

  • Wired and Wireless Network Convergence Classroom

    Sponsored by: SearchNetworking.com

    This classroom examines the potential of using 802.11ac to replace your wired network.

  • Dell Higher Education Solutions Guide

    Sponsored by: Dell, Inc. and Intel®

    Accessing network data from remote locations anywhere is no longer a luxury, but an expectation. End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.

  • Addressing All Aspects of Data Protection

    Sponsored by: CommVault

    Watch this short video to learn how one data protection platform introduces unprecedented capabilities to address snapshot management, reportingAccess from mobile devices, and more.

  • How a unified workspace solution is built for hybrid environments

    Sponsored by: NComputing

    Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.