corporate app

Results 176 - 200 of 200Sort Results By: Published Date | Title | Company Name

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.

Understanding the Impact of Comprehensive Data Security

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA

Unified Computing System Technology Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco

Unified Computing System Technology Design Guide

Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
networking, api, applications, management, visualizing, best practices, design, cvd
    
Cisco

Unified Endpoint Management: the Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: The Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (French)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (German)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Japanese)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Portuguese)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Spanish)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Users want Mobile File Access. IT Managers want Control. You can have Both.

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape

Using Next-generation Auditing to Improve Corporate Social Responsibility

Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint

VMware AirWatch® Support for Office 365

Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware

VMware Horizon Cloud: Application and Desktop Virtualization Reimagined

Published By: VMware AirWatch     Published Date: Dec 08, 2016
Today’s workforce accesses corporate content from the office, home, and everywhere in between. They utilize non-Windows devices including iOS, Android and Mac, and demand that IT support the specialized apps they need to get the job done. Savvy organizations have embraced desktop and application virtualization to meet these demands. Download this asset to learn how Horizon Cloud with on-premises infrastructure represents a new approach to building, delivering and managing virtual workspaces. This radically simple and scalable service unifies the management of on-premises virtual workspace services (desktops and applications) through a centralized cloud control plane, enabling delivery of virtual desktops and apps for as little as $0.50/user.
Tags : 
    
VMware AirWatch

VPN WAN Design Guide

Published By: Cisco     Published Date: Apr 08, 2014
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
cisco, cvds, vpn wan, it management, knowledge management
    
Cisco

Wan Optimization For Today and Tomorrow

Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Social and technological changes are transforming the nature of network traffic, raising network costs and performance issues. Learn how to proactively manage the WAN as new Web protocols, consumer and corporate video and cloud-delivered applications become mainstream.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, infrastructure, network architecture, network performance, wide area networks
    
Blue Coat Systems

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.

Where Content Is King: Tridion Intranet Solutions

Published By: Tridion     Published Date: Aug 21, 2009
Organizations have been implementing intranets for a number of years, expecting to gain efficiencies and improve information exchange among their employees. Based on an organization's objectives, an intranet can take many different forms, ranging from a corporate information and communication platform to a pragmatic approach to Knowledge Management. This White Paper specifically focuses on the lifeblood of intranets: content.
Tags : 
collaboration, content, intranet, corporate communication, workforce management, internal communication, team management, web site management
    
Tridion

Why BlackBerry 10 Raises the Bar in Enterprise Security

Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations, knowledge management
    
BlackBerry

Wild, Wild West of Mobile App Reputation

Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK

Windows Management: A Modern Makeover

Published By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
    
VMware AirWatch

Zenni Optical Expands View with Oracle Commerce

Published By: Oracle     Published Date: Jul 09, 2015
Leading online eyewear retailer Zenni Optical has incorporated Oracle Commerce to create a content-rich, visually appealing and interactive site, further enhancing the company’s continued growth as one of the leading retailers of eyewear worldwide.
Tags : 
    
Oracle

Zero Trust Delivers 6 Security and Business Benefits

Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.