mobile data

Results 376 - 400 of 683Sort Results By: Published Date | Title | Company Name

A Mobile UX Refresh to Reach Customers Worldwide

Published By: Infosys     Published Date: Jun 12, 2018
The digital world has made it possible for enterprises to reach, and deliver services to customers near and far through mobile applications. However, regular and rapid rollout of features and new versions across geographies and different operating systems call for flawless applications and mobile app testing capabilities. A chemical giant wanted to deliver agriculture data and services to their farmer clients across geographies through their mobile applications. See how Infosys helped and the five key takeaways from the project.
Tags : 
mobile, digital, customer, applications
    
Infosys

4 Powerful Levers from Lenovo and Forrester to Implement Zero Trust

Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel

Ransomware - 4 ways to protect data now

Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems

Doyle Research: Intent-Based Data Center Automation for the Enterprise

Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra

Learn how you can manage access risk in your organization

Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, security, data management, data center
    
Courion

The Digital Revolution in Higher Education

Published By: Cisco     Published Date: Jan 12, 2016
Higher education has come under increasing scrutiny as never before due to rising costs, changes in future job requirements, and new forms of learning opportunities offered by non-traditional companies and institutions. Students and parents are rightfully questioning the value of higher education based on perceived outcomes as well as staggering student loans that in some cases could take a lifetime to pay back. While the value equation debate rages on, there is another phenomenon taking place. It is nothing short of a revolution regarding the advances in technology and how institutions of higher learning along with nontraditional organizations are utilizing these powerful new tools. These new tools include new mobile devices, enhanced and feature-rich learning management systems, data-feeding sensors, 3D printers, smart classrooms, smart buildings, and collaboration tools allowing students and faculty to collaborate just about anywhere face-to-face, virtually.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking
    
Cisco

Lopez Research: An Introduction to the Internet of Things

Published By: Cisco     Published Date: Jul 11, 2016
IoT impacts every business. Mobile and the Internet of Things will change the types of devices that connect into a company’s systems. These newly connected devices will produce new types of data. The Internet of Things will help a business gain efficiencies, harness intelligence from a wide range of equipment, improve operations and increase customer satisfaction. IoT will also have a profound impact on people’s lives. It will improve public safety, transportation and healthcare with better information and faster communications of this information. While there are many ways that the Internet of Things could impact society and business, there are at least three major benefits of IOT that will impact every business, which include: communication, control and cost savings. Read to learn more!
Tags : 
    
Cisco

Machine Learning Raises Security Teams to the Next Level

Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA

eMarketer's top digital trends for 2012 and beyond

Published By: Adobe     Published Date: Jun 29, 2012
Where should you be advertising in 2012? How will consumer behavior change the way you interact with your audience? What mobile trends will impact you most this year? Marketers, retailer, content owners and technology firms are more focused than ever on obtaining results from investments in digital marketing. If past years were about amassing data from the touch points between companies, 2012 will be about curating, filtering and measuring that information to drive outcomes.
Tags : 
adobe, marketing, emarketer, digital trends, digital marketing, advertising
    
Adobe

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft

Mobile Device Security: Securing the Handheld, Securing the Enterprise

Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost
    
Motorola

Good Mobile Intranet Data Sheet

Published By: Motorola     Published Date: Feb 05, 2008
Get an overview of how Good™ Mobile Intranet can put the power of your intranet and mobile applications on your fleet of handhelds.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications, mobile computing
    
Motorola

Good Mobile Messaging Data Sheet

Published By: Motorola     Published Date: Feb 05, 2008
Read this overview of Good™ Mobile Messaging to learn how it can deliver all your enterprise e-mail, calendars, contacts and more—directly to your mobile workers—all in real time.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
    
Motorola

Benchmarking the Enterprise Road Warrior

Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.
Tags : 
mobility, wireless, remote workers, road warrior, global roaming connectivity, mobile device, cellular data cards, vpn
    
Motorola

Enterprise Mobile Adoption

Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network
    
Motorola

Good Mobile Messaging

Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good, wireless communications
    
Motorola

Comparing Options for Office 365 Mobility Management

Published By: Okta     Published Date: Aug 21, 2015
Enterprises are adopting Microsoft Office 365 in greater numbers. As part of deploying Office 365, IT teams are re-evaluating how they secure mobile access to email and apps as the data moves into the cloud. This guide provides a comparison between the free solutions offered by Microsoft and Okta for mobility management of Office 365 apps and data. Read this eGuide to learn more about the differences between Microsoft MDM and Okta Mobility Management for Office 365.
Tags : 
    
Okta

Is Your Infrastructure "Mobile Ready"?

Published By: Dell     Published Date: Mar 02, 2012
Small and medium businesses are increasingly challenged to provide comprehensive security for their mobile infrastructures without sacrificing the productivity it was designed for in the first place. Although no two situations are ever the same, the objective is always the same: protect the data that is so important to your business.
Tags : 
dell, infrastructure, data management, data systems, mobile data systems, it managers, technology, technical support
    
Dell

5 Trends That Will Impact Your IT Planning in 2012

Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business
    
Dell

Survey Reveals New Security Concerns for Mobile

Published By: Dell     Published Date: Mar 02, 2012
Since the emergence of the personal computer, IT managers have had to navigate through a computing and communications landscape where business and consumer technologies have intersected. Sometimes those intersections produce benefits for all involved; other times they result in destructive collisions.
Tags : 
dell, idg, mobile technology, mobile data, mobile phones, mobile services, network security, network management
    
Dell

The ROI of Cloud Apps A Total Economic Impact Analysis Uncovers Long-Term Value In Cloud Apps

Published By: Box     Published Date: May 30, 2012
This report analyzes the longer-term, five-year cost of ownership and value for cloud applications across four categories: CRM, ERP, collaboration (including email), and IT service management.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
Box

Empowering Your Mobile Worker

Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online
    
Box

Sharing Simplified - Consolidating Multiple File Sharing Technologies

Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online
    
Box

The ROI of Cloud Apps - Forrester Research Inc. Uncovers Long-Term Value in Cloud Apps

Published By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-­scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : 
cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage
    
Box

Cloud-Content Collaboration Services Enabling Enterprises to Move Toward Next-Gen Collaboration

Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage
    
Box
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.