devices

Results 426 - 450 of 1773Sort Results By: Published Date | Title | Company Name

Can "Easy" Really Be Built Into ERP Software

Published By: Plex Systems     Published Date: Aug 15, 2014
The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.
Tags : 
erp systems, security, manufacturing, communications. data entry, networking
    
Plex Systems

5 Key Considerations when Choosing Technology for Use with Office 365 Cloud Voice

Published By: Polycom     Published Date: Oct 17, 2016
When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, make sure to download this white paper.
Tags : 
    
Polycom

Real-World Testing Ensures Real-World Performance for Rugged Devices

Published By: Dell     Published Date: Sep 14, 2017
Read this executive brief from Quinn Street to learn how: • Advances in mobility and durability are allowing computing devices to leave the office and be used in field environments • Organizations that invest in rugged devices for field operations will see a better return on investment compared to non-rugged devices • Discover how Dell’s investment in real-world testing helps its rugged devices stand up to harsh environments
Tags : 
    
Dell

The Rugged Truth: TCO of Rugged vs. Non-Rugged Computing Devices

Published By: Dell     Published Date: Sep 14, 2017
Total cost of ownership of rugged vs. non-rugged computing devices. Whether training, on patrol or in the field, our police officers, firefighters and other first responders and our military men and women operate in some of the harshest of environments where computing is critical for communication and situational analysis. This is why choosing the right device to support these situations is often paramount to their success.
Tags : 
    
Dell

Breakthrough Technology Interactive eGuide

Published By: Dell     Published Date: Sep 18, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure
Tags : 
    
Dell

Creating an environment that accelerates transformation

Published By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
    
Dell

Securing Office 365 with MobileIron

Published By: MobileIron     Published Date: Jul 31, 2015
Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees for productivity, collaboration, CRM, ERP, analytics, and industry-specific business processes. Office 365 might be the productivity solution, but the IT team needs a central platform that can provide a consistent security and policy framework across all the mobile apps the organization will deploy both today and tomorrow. This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron

Magic Quadrant for Enterprise Mobility Management Suites

Published By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron

With MobileIron, Varian Medical Systems Employees Can Be Productive “Wherever, Whenever”

Published By: MobileIron     Published Date: Aug 27, 2015
This is a case study about the Varian Medical system's focus on energy and saving lives through advanced technology.
Tags : 
mobileiron, medical devices, medical software, security
    
MobileIron

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks

Network-based threat detection

Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat, ips, ids, firewall, antivirus, business continuity, intrusion detection, intrusion prevention, security management, vulnerability management
    
Vectra Networks

Desktop and Application Virtualization for the 21st Century

Published By: VMware AirWatch     Published Date: Feb 21, 2017
Today’s IT organizations simply cannot afford to continue to manage the end user environment with an out-of-date PC-centric approach to systems management. The cloud, mobility and multiplatform environments render that approach ineffective. It’s time to take another look at virtual application and desktop virtualization technologies. Download this whitepaper to look at VMware Horizon, the most complete solution for delivering, managing and protecting Windows desktops, applications and online services across devices, locations, media and connections, making it ideal for systems management transformation.
Tags : 
    
VMware AirWatch

Designing Edge Products for the Internet of Things

Published By: Arrow Electronics     Published Date: Oct 28, 2015
The Internet of Things enables a level of communication, collaboration and interaction between devices, sensors, machines and people that has never before been possible. This connectivity is what is called an intelligent system, and it’s revolutionizing the way we think about edge products.
Tags : 
    
Arrow Electronics

A User-Centric Approach to Integrated Identity and Mobility Management

Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta

A New World Order for IT

Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, best practices, business intelligence, business management, business technology, cloud computing
    
Okta

The Foundation for Cloud-first, Mobile-first IT

Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence, cloud computing
    
Okta

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence
    
Okta

Switching Mobile Device Management Solutions

Published By: Jamf     Published Date: Jan 18, 2018
Ace your migration with a manageable timeline. Once the decision is made to switch MDM solutions, the first step is to construct a logical, achievable timeline. The timeline should include critical milestones, financial considerations, school breaks, or any other factors that may impact implementation success. Choose a time when devices can be out of use in order to give IT time to make the transition without impacting users. Download this whitepaper to learn more!
Tags : 
    
Jamf

Apple Device Management for Beginners

Published By: Jamf     Published Date: Jan 18, 2018
As Apple device numbers rise in business and education environments around the globe, it’s imperative that technology investments are maximized so that organizations can leverage Mac, iPad, iPhone and Apple TV to their full potential. This can put a heavy burden on IT staff that are now tasked with managing this influx of new devices – especially those of you in established Windows environments.
Tags : 
    
Jamf

Mobile Device Management 101: Unlock the Power of iPad in Education

Published By: Jamf     Published Date: Jan 18, 2018
Schools are not choosing just any mobile technology. They are adopting iPad, because it is preferred by students and teachers is easier to manage and offers extensive security features. When schools give iPad devices to students, they pave the way for enhanced creativity, more productivity, better engagement and spontaneous collaboration.
Tags : 
    
Jamf

Modern Device Management: Mac Alongside Windows

Published By: Jamf     Published Date: Mar 13, 2018
The rise of Apple devices in a Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This white paper outlines how Apple AND Windows devices, tools, and infrastructure can happily integrate and coexist together.
Tags : 
    
Jamf

Security Considerations for Apple in the Enterprise

Published By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf

Mobile Device Management 101 for Higher Education

Published By: Jamf     Published Date: Mar 29, 2018
As iPad and iPhone usage continues to grow in higher education institutions around the world, finding the right way to manage iOS devices can be as important as the technology itself. In this e-book, we’ll educate you on the basics of mobile device management (MDM) and explain how you can maximize your education technology purchases. Become an expert in: • The state of iOS in higher education • Best practices and workflows for iPad and iPhone device management • Moving higher education forward with Apple TV
Tags : 
    
Jamf

Higher Education Mac Labs Reimagined

Published By: Jamf     Published Date: Mar 29, 2018
With Mac labs being a major presence on university campuses, many IT admins rely on imaging to ensure computers do not fall prey to viruses and costly data breaches, and to provide students with the education resources they need to be successful. The problem is imaging machines is a tedious and manual process, requiring lots of IT time. In this white paper, we examine a better way to manage a Mac lab and explain how to: • Leverage Apple’s Device Enrollment Program (DEP) to automatically configure and enroll Mac devices into management • Make apps and resources readily available for students to use, regardless which computer they choose • Ensure students only have access to the resources relevant to them by binding machines to your school’s directory services system
Tags : 
    
Jamf

5 Security Tips to Help Accountants Work From Anywhere (Accounting)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.