laptop

Results 176 - 200 of 243Sort Results By: Published Date | Title | Company Name

Operationalize Security To Secure Your Data Perimeter

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418

Extending System Longevity with Diskeeper

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
Tight IT budgets demand that desktop and laptop PCs remain in service well beyond their prime. But as these systems age, performance degrades. The culprit most often is file fragmentation. Download this paper to find out how Diskeeper can help your systems perform longer.
Tags : 
pc performance, system performance, defrag, defragment, defragmentation, old pc, old pcs, old desktop
    
Diskeeper Corporation

Successful Mobile Deployments Require Robust Security

Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication
    
BlackBerry

Ponemon Study: The TCO of Software vs. Hardware-based Full Disk Encryption

Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : 
ponemon, tco, software, hardware, full disk, encryption, total, cost
    
WinMagic Inc.

Arcserve Unified Data Protection Workstation FREE

Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, knowledge management, enterprise applications
    
Arcserve

Queens Pediatrics - Increasing Physician Mobility

Published By: Fujitsu Healthcare     Published Date: Nov 04, 2013
In 2010, Queens Pediatrics began evaluating Electronic Health Record (EHR) solutions to improve access to patient records. The practice’s affiliation with North Shore LIJ prompted it to evaluate solutions from Allscripts. North Shore LIJ is the largest user of Allscripts system and provides a financial subsidy to its affiliated practices that adopt the solutions. The challenge for Queens Pediatrics was the small size of its offices, which didn’t provide enough room for multiple workstations or to move mobile computer carts through the hallways. “There were only two options. The physicians either had to use a laptop or we had to have a PC in each room, and that doesn’t work well in a pediatric office,” said Janette Finn, the Practice Manager at Queens Pediatrics. Download this Case Study to find out the Solution to the challenges Queens Pediatrics faced.
Tags : 
electronic health record, ehr, best practices, solutions, medical mobility, case study
    
Fujitsu Healthcare

Identity as a Revenue Generator: Getting Started with Customer Focused Identity Management

Published By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
    
ForgeRock

Identity As a Revenue Generator: Getting Started with Customer-Focused Identity Management

Published By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
irm, management, time-to-market, forgerock, revenue generator, software development
    
ForgeRock

How to Make Your Mobile Workforce Stronger

Published By: Lenovo     Published Date: Sep 11, 2012
Discover why IT Managers are recommending Lenovo's ThinkPad Carbon as an essential tool for a busy workforce that's always on the go.
Tags : 
macbook air, apple, ibm, lenovo, carbon fiber, infographic, laptop, mobile computer
    
Lenovo

Advanced Endpoint Security for Dummies

Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM

Unified Management of Endpoints, End Users and Everything in Between

Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM

Mobile Vision 2020

Published By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : 
ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
    
IBM

Mobile Vision 2020: The Impact of Mobility, The Internet Of Things, And Artificial Intelligence On T

Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
Forrester survey: global IT leaders plan their transition to consolidated, cognitive smartphone, tablet, laptop, and IoT security by 2020.
Tags : 
iot security, internet of things, mobility
    
Group M_IBM Q1'18

IBM MaaS360

Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
IBM MaaS360 provides unified endpoint management (UEM) across desktops, laptops, tablets, smartphones, and the Internet of Things (IoT).
Tags : 
internet of things, uem, unified endpoint management, iot
    
Group M_IBM Q1'18

Safeguard Data Loss

Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security
    
Utimaco

Successfully extend CRM to your mobile workforce

Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service
    
Sage SalesLogix

Preparing your network for the mobile onslaught - How networks can overcome the security, delivery c

Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations
    
IBM

ZK Research White Paper: Best Practices for Building a Mobility Strategy

Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management, mobile data systems, mobile workers
    
Cisco

Intelligent Client-Side Defense for Stolen Laptops

Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software

Top Use Cases for Desktop Virtualization (Infographic)

Published By: Citrix     Published Date: May 09, 2014
A wide range of business issues is driving IT toward desktop virtualization. One solution—Citrix XenDesktop with FlexCast technology—helps IT teams empower their entire workforces, one project at a time
Tags : 
citrix, virtualization, desktop virtualization, mobile workers, laptops, xendesktop, mobile, remote access
    
Citrix

Extending the benefits of desktop virtualization to mobile laptop users.

Published By: Citrix     Published Date: Sep 17, 2013
Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Download here to learn about XenClient, an innovative, clientside alternative for delivering virtual desktops, which allows IT to extend the benefits of desktop virtualization to laptop users whether they are working online or offline.
Tags : 
remote access, access control, mobile computing, mobile workers, messaging, virtualization, mobile device management
    
Citrix
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.