mobile data

Results 501 - 525 of 693Sort Results By: Published Date | Title | Company Name

Securing end-user mobile devices in the enterprise

Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, business technology, telecom
    
IBM

Securing Mobile Devices in the Business Environment

Published By: IBM     Published Date: Mar 04, 2014
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.
Tags : 
ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise, mobile device platform, it management, malware, spam, phishing, bluetooth, wi-fi, theft, enterprise applications, mobile computing, secure content management
    
IBM

Securing mobile devices in the business environment

Published By: IBM     Published Date: Feb 11, 2015
This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.
Tags : 
corporate data, business value, mobile devices, client services, security, it management, business intelligence, data protection, database security
    
IBM

Securing Productivity in the Borderless Enterprise

Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology, business intelligence, business management
    
Microsoft

Securing Your Enterprise in the Cloud

Published By: Symantec     Published Date: Jun 18, 2015
Learn how to properly secure your enterprise in the cloud and see why it is important to safely move your organization to the cloud.
Tags : 
mobile devices, enterprise in the cloud, data breach, centralized servcers, security, enterprise applications
    
Symantec

Securing Your Mobile Workforce Locking Down Data in Your Environment

Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce, mobile computing, mobile data systems, mobile workers, wireless communications, workforce management, database development, human resources services, workforce management software
    
Symantec.cloud

Securing Your Worklight Applications with IBM Worklight Application Scanning

Published By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : 
application screening, user feedback, mobile app development, cloud-based services, it management, knowledge management, enterprise applications, data management
    
IBM

Security Technologies for Mobile and BYOD

Published By: Kaspersky     Published Date: Feb 05, 2015
The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.
Tags : 
mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky, anti spyware, anti virus, application security, security management, mobile device management
    
Kaspersky

Security’s new frontier: The Cloud

Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA

Service Virtualization For Dummies

Published By: IBM     Published Date: Apr 09, 2015
Discover service virtualization and how it fits into the big picture of software quality. In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes while reducing testing downtime and testing cost. The book covers the following topics and more: • Understand the changing relationship between IT and business — quicker delivery is required • Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. • Discover how to begin with service virtualization — build your business case. • Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, testing processes, software testing, packaged apps, delivery, ibm, software development, it management, enterprise applications, business technology
    
IBM

Service Virtualization for Dummies

Published By: IBM     Published Date: Oct 02, 2015
The book covers the following topics and more: - Understand the changing relationship between IT and business — quicker delivery is required - Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. - Discover how to begin with service virtualization — build your business case. - Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, efficiency, testing processes, testing, mobile applications, web applications, middleware, packaged apps, databases, security, it management, enterprise applications, business technology
    
IBM

Seven ways SteelFusion 4.0 and branch IT are similar to your smartphone

Published By: Riverbed     Published Date: Jun 01, 2015
With more powerful software and hardware, SteelFusion 4.0 consolidates all IT at the branch into the data center for instant branch provisioning and recovery, full security and visibility, and apps that simply work.
Tags : 
application, data, mobile, infrastructure, virtualization, database development, data integration, data quality
    
Riverbed

Sharing Simplified - Consolidating Multiple File Sharing Technologies

Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, knowledge management, backup and recovery
    
Box

Simple is STILL Better: Embrace Speed & Simplicity for a competitive edge

Published By: IBM     Published Date: Apr 19, 2016
This white paper describes how IBM’s Pure Data System for Analytics delivers speed and simplicity to help organizations become more responsive and agile in today’s increasingly mobile and data-driven market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, data management
    
IBM

Simple is STILL better: Embrace Speed & Simplicity for a competitive edge

Published By: IBM     Published Date: Jul 05, 2016
This white paper describes how IBM’s Pure Data System for Analytics delivers speed and simplicity to help organizations become more responsive and agile in today’s increasingly mobile and data-driven market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, knowledge management, enterprise applications, data management, business technology, data center
    
IBM

Simple is STILL better: Embrace Speed & Simplicity for a competitive edge

Published By: IBM     Published Date: Oct 13, 2016
This white paper describes how IBM’s Pure Data System for Analytics delivers speed and simplicity to help organizations become more responsive and agile in today’s increasingly mobile and data-driven market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, enterprise applications, data management, business technology, data center
    
IBM

Simple, reliable, and affordable business transformation

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation, business integration, business metrics, productivity
    
Hewlett Packard Enterprise

Simplify eDiscovery with a Mobile and Cloud Data Strategy

Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva

Simplify Endpoint Management with Citrix and Google Chrome Enterprise

Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Cisco and NVIDIA Corporation

Six Steps to Control the Uncontrollable

Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft

Smarter Process for Dummies

Published By: IBM     Published Date: May 28, 2015
In this book, you look at how the Smarter Process approach helps you create a more customer-centric organization. You discover how four major technologies — mobile, cloud computing, Big Data, and social collaboration — are disrupting the way you do business and how you can work through the challenges.
Tags : 
smarter process, data management, business models, blueworks live, big data, cloud computing, social collaboration, data center
    
IBM

SmartPaper: The next wave of business intelligence for the data-driven enterprise

Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM

So, You're Responsible for Managing Laptops

Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software

SOA Architecture: Why You Need API Management

Published By: MuleSoft     Published Date: Sep 08, 2016
Since it first emerged more than a decade ago, Service Oriented Architecture (SOA) has been both widely praised as a modern and agile approach to software development and infrastructure architecture and dismissed as a colossal waste of time and money. Missed expectations for many SOA projects led one analyst in 2009 to declare, “SOA is dead.” Far from being dead, however, service oriented architecture is in fact more relevant than ever
Tags : 
mulesoft, service oriented architecture, software development, saas, mobile, big data, business analytics, business intelligence, business management, business process management, customer interaction service, customer relationship management
    
MuleSoft
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.