mobile data

Results 501 - 525 of 706Sort Results By: Published Date | Title | Company Name

The 5 Next Big Things in Mobile Security (French)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

The 5 Next Big Things in Mobile Security (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (German)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Spanish)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (French)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

CLOUD-BASED FINANCE FOR THE TALENT-DRIVEN ENTERPRISE

Published By: Workday     Published Date: Jun 05, 2017
In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.
Tags : 
workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology, finance technology, mobile data systems, smart phones, workforce management, data protection, collaboration, payroll software, financial management, expense management, data loss prevention
    
Workday

IT'S ALL ABOUT SECURITY: THINGS TO KNOW BEFORE YOU OPEN THE DOORS TO SMARTPHONES

Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management, application security, patch management, wireless application software, wireless security, data protection
    
SAP

Simplify eDiscovery with a Mobile and Cloud Data Strategy

Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva

Javelin: 2016 Digital Channel Threat Report: Derisking Convenience

Published By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS

Internet Security THREAT REPORT 2014

Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection, spear phishing, phishing, spam, virus, malware, hackers, cyber criminals, internet security, network security, anti spam, anti spyware, anti virus
    
Symantec

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

The Drivers and Benefits of Edge Computing

Published By: Schneider Electric     Published Date: May 09, 2016
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
schneider electric, edge computing, data center, energy efficiency, data center energy, power and cooling, data center design and management
    
Schneider Electric

The CIO's Guide to Fixed Mobile Convergence

Published By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : 
blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware
    
BlackBerry

Understanding High Availability for the BlackBerry Enterprise Server

Published By: BlackBerry     Published Date: Jul 23, 2009
Over the last fifteen years, mobility solutions have evolved from cell phones and pagers to platforms for wireless email and mobilizing business applications. Today's road warriors depend on their mobile devices for fast, reliable, easy access to applications and corporate data. Mobile solution downtime can adversely affect customer service, productivity, sales, and revenues.
Tags : 
blackberry, mobile applications, cio, availability, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software
    
BlackBerry

Threat Vector Series - Data Protection for Midsize Companies

Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, anti spam, application security, authentication, ddos, disaster recovery
    
McAfee Inc

Numara FootPrints Mobile: Service Desk On-the-Go

Published By: Numara Software     Published Date: Jul 16, 2009
Delivering world class customer service in today’s fast paced business environment is becoming more difficult as information and data requires instant access.
Tags : 
footprints, numara, blackberry, mobile, service desk, on-the-go, slas, service level agreements, smartphone, off-line synchronization, critical data, projects, surveys, workflow, service desk, tracking, billing, accounts receivable, automated integration, automated tools
    
Numara Software

Salesforce CRM Mobile Implementation Guide

Published By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : 
salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange, salesforce mobile, best practices, business activity monitoring, business intelligence, business management, call center management, call center software, enterprise software, project management, sales & marketing software
    
Salesforce.com

Mobile BI: Actionable Intelligence for the Agile Enterprise

Published By: SAS     Published Date: Apr 13, 2011
BI usage among organizations with mobile BI has doubled compared to those companies that have not mobilized their BI. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : 
mobile bi, business intelligence, andrew borg, david white, aberdeen, performance management, data management, knowledge management, maturity, data security, data protection, data quality, database security
    
SAS

Mobile: The New Marketing Frontier

Published By: IBM     Published Date: Apr 22, 2014
Consumers are leveraging innovative and richly functional mobile devices to become connected and empowered like never before, reshaping the consumer/marketer relationship and raising the stakes for marketers to utilize the mobile channel to engage shoppers and drive revenue.
Tags : 
ibm, mobile marketing, mobile, enterprise marketing management, management, consumers, customers, innovative marketing, cross-channel experience, mobile users, mobile consumers, retailers, marketers, higher mobile use, digital analytics, benchmark data, mobile-only, online retailers, mobile applications, mobile opportunities
    
IBM

Webroot 2015 Threat Brief

Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc

Econsultancy: Digital Trends 2015

Published By: Adobe     Published Date: Jun 03, 2015
Download the 2015 Digital Trends report, created in partnership with Econsultancy, to see the trends and tools you need to provide exceptional customer experiences and to gain a competitive edge.
Tags : 
adobe, trends, content, experience, mobile, social, multichannel, video, automation, personalization, data, digital, personalization
    
Adobe

Digital Content Security Pocket Guide

Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe

Mobilize Your Business with Office 365

Published By: Microsoft Office 365     Published Date: Mar 11, 2016
The cloud gives businesses of all shapes and sizes an opportunity to be mobile. Employees get flexible, secured access to important data and applications from virtually anywhere. Documents are safely stored, synchronized, and shareable at a moment’s notice—collaboration on the go has never been easier.
Tags : 
    
Microsoft Office 365

Windows 10 Mobile: The Right Choice for Business Mobile Device Management

Published By: Microsoft Nokia Lumia     Published Date: Jun 08, 2016
Organizations' users increasingly depend on their mobile devices, but phones and tablets bring new and unfamiliar challenges for IT departments. IT must be able to deploy and manage mobile devices and apps quickly to support the business while balancing the growing need to protect corporate data because of evolving laws, regulations, and cybercrime.
Tags : 
    
Microsoft Nokia Lumia
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.