devices

Results 176 - 200 of 1764Sort Results By: Published Date | Title | Company Name

Unified Web Security Solutions. Deliver No-Boundaries Protection To Users That Are Always On

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking
    
Blue Coat Systems

Mobile Security Challenge Emerges

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless
    
Blue Coat Systems

Unified Web Security Solutions. Deliver No-Boundaries Protection To Users That Are Always On

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security, access control, application security, firewalls
    
Blue Coat Systems

Mobile Security Challenge Emerges

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile, security, devices, users, bluecoat, mobile computing, mobile data systems, smart phones
    
Blue Coat Systems

Solving the Engagement Challenge

Published By: Avaya     Published Date: Feb 06, 2015
This paper provides information about solving the engagement challenge. When workers have flexibility in terms of tools, apps and devices, they can stay nimble, innovative and creative. In turn, they keep your company nimble, innovative and creative. To make it work you need to give workers the Unified Communications tools, apps and devices that allows them to better serve both internal and external customers. But that’s not as simple as it sounds. Organizations face enormous challenges in deciding whether and how to support consumer devices.
Tags : 
solving the engagement challenge, byod, byoa, mobile computing, mobile data systems, mobile workers, smart phones, customer experience management
    
Avaya

Secure Enterprise Mobility to Prevent Data Loss and Unauthorized Access

Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi

Identifying and Overcoming the Obstacles to Achieve Enterprise Mobility Excellence

Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity, bluetooth, mobile computing, business analytics
    
Panasonic

Your Risk: The Top Mobile Security Issues Decoded

Published By: Panasonic     Published Date: Aug 04, 2016
Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.
Tags : 
cyber risk, security, mobile security, best practices, business management
    
Panasonic

Monitor Optimize Validate E-Book

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies

Accelerate Workload Performance: A Blueprint to Storage Modernization

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
    
Hewlett Packard Enterprise

Five Guiding Principles to Enrich the Workplace Experience: A Blueprint for Intelligent Spaces

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
IT services such as mobile devices, smart applications and cloud-based services are transforming the way we live, work and communicate. Global technology services and businesses are embracing digital transformation, introducing Intelligent Spaces to unleash worker productivity and accelerate the pace of business. The workplace plays a critical role in an organization’s digital transformation. Forward-looking organizations recognize that you can’t build a digital business without building a digital workplace.
Tags : 
    
Hewlett Packard Enterprise

One Size Doesn’t Fit All: Overcoming 3 Challenges to Field Workforce Mobile Device Deployment

Published By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today there’s no such thing as “one size fits all” when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions

Making the Right Decision - Build or Buy DPI?

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity

Executive View: CA Privileged Access Manager

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
    
CA Technologies

Virtual Meetings without Technical Limitations

Published By: Arkadin     Published Date: Nov 20, 2018
Are you considering cloud-based video conferencing? Organizations today are seeking simple HD video conferencing solutions with a seamless and consistent user experience across devices. Preparation is key in realizing the benefits of cloud-based video conferencing, so we've put together a list of the most important items to consider to help get you started.
Tags : 
virtual, cloud, cloud-based, video, hd video, conferencing, preparation, solutions
    
Arkadin

Insiders are Still the Weakest Link in your Data Security Chain

Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software
    
Absolute Software

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security, security management, business analytics, business integration, business intelligence
    
Absolute Software

Learn How Citrix Can Help Reduce Costs While Reaching New Levels of Mobility

Published By: Citrix Systems     Published Date: Feb 23, 2011
By using Citrix ReceiverT, organisations are able to deliver virtualized applications and desktops to their employees' mobile devices.
Tags : 
citrix systems australia, customer profile, apple ipad, citrix receiver, employee productivity, mobile devices, virtual desktop, mobile computing
    
Citrix Systems

Digital Publication Platform Market Overview

Published By: Adobe     Published Date: Feb 03, 2015
This White Paper provides information on new trends and key findings of Digital Publication Platforms.
Tags : 
digital publication platform, content marketing, customer relationship management, customer satisfaction, content delivery, content management
    
Adobe

Drive Revenue with Sales Enablement Apps

Published By: Adobe     Published Date: Aug 04, 2015
This paper discusses the features of Digital Publishing Suite that enable these and other companies to drive sales impact through tablets.
Tags : 
digital marketing, sales, sales enablement apps, mobile sales enablement, crm, digital publishing, mobility, mobile devices
    
Adobe

How Do You Compare With Mobile Leaders?

Published By: Adobe     Published Date: Aug 04, 2015
The survey offers a big picture view of the investments in mobile by leading marketers—and what it will take to stay on top.
Tags : 
mobility, mobile leaders. mobile, smartphones, customer engagement, mobile marketers, mobile devices, mobile data systems, mobile workers
    
Adobe

Customer Experience First

Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model, mobile computing
    
Adobe

Kundupplevelsen Först

Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model, mobile computing
    
Adobe

Das Kundenerlebnis Geht Vor

Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model, mobile computing
    
Adobe

La nouvelle norme: l'Expérience Client d'Abord

Published By: Adobe     Published Date: Feb 10, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model, mobile computing
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.