mobile data

Results 476 - 500 of 693Sort Results By: Published Date | Title | Company Name

Rethink Networking for the Cloud Era white paper

Published By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today’s IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)—the ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: • Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. • Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. • Deploy locally with zero touch via automated
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Riverbed DE

Rethinking Data Security with a Risk-Adaptive Approach

Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint

RFID for Railway Industry

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Railroads face a complex set of economic and operational challenges like competitive freight pricing, asset utilization and competition with trucking, capital expenditure levels, industry consolidation and debt management. Learn how RFID technology can help railroad professionals address these challenges.
Tags : 
rfid, rfid tags, mobile data systems, wireless hardware, gao, gao group, gao rfid, railroad, locomotive, automotive, transportation
    
GAO RFID Inc.

RFID Solutions for ID Badges and Access Control

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : 
rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid, access control system, barcodes, smart cards
    
GAO RFID Inc.

RFID Solutions for Library Systems

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Institutional (academic) libraries and public libraries face growing challenges in managing the assets of their collection and maintaining or improving service levels to patrons. Learn how libraries can leverage RFID solutions to save time, reduce cost, and increase productivity.
Tags : 
mobile data systems, rfid, rfid tags, libraries, library, mobile data systems, gao, gao rfid, gao group, wireless infrastructure
    
GAO RFID Inc.

ROI of Common Short Code and SMS Mobile Marketing

Published By: Neustar     Published Date: Nov 16, 2009
Mobile has hit the mainstream in the U.S. At the end of 2009, the number of mobile subscribers had grown to 280 million, reaching 87% of U.S. households. The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging and Internet access.
Tags : 
sms mobile, neustar, roi, csc, common short code, mobile marketing, two-way communication, mobile, text messaging, database, chat, short codes, customer acquisition
    
Neustar

Running Tapjoys mobile ad platform on Cisco Metapod

Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco

Safeguard Data Loss

Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security, wireless security, utimaco, security, security management, pda
    
Utimaco

Safety First: The Face of Cybersecurity in Today's Workplace

Published By: HP Inc.     Published Date: Jun 03, 2019
As the changing workforce puts pressure on companies to adopt the use of mobile and personal devices, significant business trends, such as data analytics, the digitization of business functions and the blending of service offerings across industries, are also expanding the use of technologies. This expansion increases the boundaries of what’s possible, and it also creates risks.
Tags : 
    
HP Inc.

Salesforce CRM Mobile Implementation Guide

Published By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : 
salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange, salesforce mobile, best practices, business activity monitoring, business intelligence, business management, call center management, call center software, enterprise software, project management, sales & marketing software
    
Salesforce.com

Salesforce Financial Services Cloud

Published By: Salesforce     Published Date: Nov 19, 2015
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, today’s financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want.
Tags : 
salesforce, financial services, cloud, mobile, data, mobile computing, data center
    
Salesforce

SAML as an SSO

Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data, it management
    
Gigya

Samsung Electronics Standardizes on PTC Windchill Solution

Published By: IBM     Published Date: Mar 17, 2009
PTC, the Product Development Company® today announced that Samsung Electronics Co., LTD (SEC), a leading digital products manufacturer of mobile phones, televisions, and semiconductors, has selected PTC Windchill as its digital product development data repository to manage an integrated BOM of mechanical, electrical and software data across its globally distributed product development environment. Windchill is the standard enterprise PLM solution at SEC because of its powerful, Web-based support of key product development processes on a single technology architecture and execution environment.
Tags : 
ibm, telelogic, samsung, ptc windchill, press release, electronics industry, product development, global bom, product lifecycle management, content management, dynamic publishing, enterprise applications, electronics
    
IBM

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

SAS® in the Open Ecosystem

Published By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. • A data scientist in the business development team analyzes data to create customized • experiences for premium customers. • A digital marketer tracks and influences the customer journey for prospective • mortgage customers. • A risk analyst builds risk models for the bank’s loan portfolios. • A data analyst examines data about local customers. • A technical architect defines a new system to protect bank data from internal and • external cyberthreats. • An application developer builds a new mobile app for online customer portfolio • management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
    
SAS

Seconds Matter: Resolve Issues Quickly with the World’s Fastest Remote Desktop Management

Published By: Kaseya     Published Date: May 13, 2015
As an IT professional, you know that when you have many users to support, every second count. Your remote connection speed and reliability are critical to your ability to resolve issues quickly, maximizing IT efficiency and ensuring a happy and productive end user.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya

Secure and compliant – Office365 enterprise mail on your mobile, natively

Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.
Tags : 
office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management, data protection, security management, mobile computing, wireless security, best practices, business intelligence, messaging
    
Nativeflow

Secure Critical Company Information when a Mobile Device is Lost

Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere

Secure Mobile Payments - Protecting display data in TrustZone®-enabled SoCs with Evatronix PANTA IP

Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix

Secure the SaaS Tsunami

Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin

Secure your Mobile Workforce

Published By: Okta     Published Date: Apr 29, 2015
Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce.
Tags : 
mobile, mobile workforce, okta, security, it management
    
Okta

Securing BYOD

Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy, internet security, security management, mobile workers, wireless security, mobile device management
    
CDW
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.