mobile environment

Results 1 - 25 of 164Sort Results By: Published Date | Title | Company Name

Ricoh Addresses SMB Needs with Subscription-Based Cloud Workflow Solutions

Published By: Ricoh US     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
    
Ricoh US

Flexible IT: On-Premise and Cloud-Based Resource in an Effective Hybrid IT Environment

Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible. Like larger companies, midsize firms must make sure that they are effectively coordinating on-premise, public cloud, and private cloud capabilities. Unlike large companies, though, midsize firms are limited in both financial and technical resources to design and coordinate effective solutions to meet specific needs. Rather than invest in a major overhaul of their IT environments, midsize firms have to move incrementally, supplementing current resources with new cloud and on-premise capabilities that provide the performance needed to prosper in an increasingly competitive environment.
Tags : 
    
Hewlett Packard Enterprise

Going Mobile

Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault

Invest in the right flash storage solution: A guide for the savvy tech buyer

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
In today’s dynamic business environment where applications and data are accessed outside of traditional corporate boundaries, IT must embrace the needs of both the business and an ever present mobile workforce. Download this asset to learn more about working to support initiatives that keep the business agile and growing, and employees productive. Sponsored by: HPE and Intel®
Tags : 
best practices, mobile workforce, business management, business environment, applications, technology, mobile computing, business intelligence, business technology
    
Hewlett Packard Enterprise

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

3 Must-Haves for Rugged Devices

Published By: Dell     Published Date: Nov 20, 2014
A rugged device is just one piece of a mobile solution for highly demanding environmental work environments. Support, security, and manageability will keep employees in the field, on the road, and in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged mobile notebooks and services to meet the demands of your end users.
Tags : 
durable devices, instantgo2, it protection, encryption
    
Dell

Power of Convergence: Dell VRTX Empowers Small, Remote and Mobile Environments

Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
One of the greatest competitive advantages a small business can offer the customer is its inherent ability to change rapidly. Whether or not the business is able to depend on deployed solutions to scale with evolving needs often defines its ability to compete.
Tags : 
dell, dell vrtx, mobile environments, convergence., it management
    
Dell Brought to you by Intel

Craft Enterprise Plans for Your Organization’s Mobile Security

Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications, business technology
    
PulseSecure

DELIVER A SIMPLE AND CONSISTENT DISTRIBUTED ENTERPRISE WITH VXRAIL

Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, enterprise applications
    
DellEMC and  Intel®

SIMPLIFICATION DE L’ENTREPRISE DÉCENTRALISÉE

Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, enterprise applications
    
DellEMC and  Intel®

DAS DEZENTRALE UNTERNEHMEN VEREINFACHEN

Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® Prozessor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, enterprise applications, data center
    
DellEMC and  Intel®

Security for the future-ready workforce

Published By: Dell     Published Date: Aug 17, 2017
Today, technology is all about enabling business. Organizations of many types and sizes are developing, upgrading or replacing mobile applications to reflect changes in the workplace. Across industries, employees are working more while mobile, using multiple devices. When they return to the office, they are capitalizing on more flexible work environments and approaches to work. Many organizations are facilitating this anytime, anywhere work with mobility initiatives that provide mobile devices or allow employees to use their own. They are also modifying workspace designs, creating mobile workstations and mobile “hot spots” to enable workers to easily connect to enterprise systems when they return to the office. Enabling employees to work better can help organizations boost productivity and improve customer service. The real challenge is to continue supporting new ways of working, now and in the future, without compromising security.
Tags : 
security, workforce productivity, flexible work environments, secure employee systems, advanced
    
Dell

Efficient, Cost-Effective VDI Expansion on Converged Infrastructure

Published By: Dell EMC     Published Date: May 10, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace. In this IDC white paper, learn how to leverage converged infrastructure as a cost-effective and efficient platform to support virtual client computing environments with Dell EMC. Download this white paper from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC

Define Your Data for Better Document Security

Published By: Adobe     Published Date: Nov 25, 2013
Without document classification in play, it's impossible to know what to protect. The mobile ecosystem makes workers infinitely more productive, which is one reason that it won’t go away. This white paper explores the question: How can IT govern and protect content in such ad hoc and semi-structured environments? Please download whitepaper to learn more.
Tags : 
document, document classification, document security, mobile, mobile workforce, cloud-based, mobile, mobile ecosystem, it governance, semi-structured environments, sensitive documents, corporate liabilities, enterprise, enterprise solutions, networking, security, wireless, storage area networks, storage management, application integration
    
Adobe

Cross-channel Marketing - 5 Practical Tips to Boost ROI

Published By: Oracle     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
    
Oracle

Unified Web Security Solutions. Deliver No-Boundaries Protection To Users That Are Always On

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking, wireless, business technology, data center
    
Blue Coat Systems

Unified Web Security Solutions. Deliver No-Boundaries Protection To Users That Are Always On

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security, access control, application security, firewalls, internet security, network security appliance, security management
    
Blue Coat Systems

Mobile Computing Redefined: How to Maximize Business Efficiency with Modern Solutions

Published By: Panasonic     Published Date: Aug 04, 2016
Maximizing productivity in challenging work environments is not easy, and that’s why selecting the right mobile computing solution is crucial. It’s not enough to simply hand your workers or technicians any mobile device; if the hardware can’t operate reliably in their typical work environment, they might as well be working with pen and paper.
Tags : 
mobile computing, best practices, productivity, mobile device, business analytics, business management
    
Panasonic

Protect Your Data The Way Banks Protect Your Money

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies

Using Threat Analytics To Protect Privileged Access And Prevent Breaches

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security, security management, business analytics, business integration, business intelligence
    
Absolute Software
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.