pto

Results 351 - 375 of 436Sort Results By: Published Date | Title | Company Name

Preparing your network for the mobile onslaught - How networks can overcome the security, delivery c

Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations
    
IBM

ZK Research White Paper: Best Practices for Building a Mobility Strategy

Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management, mobile data systems, mobile workers
    
Cisco

Power of Cloud Executive Brief

Published By: IBM     Published Date: Apr 09, 2015
Although cloud is recognized as a technological change, its potential for driving business innovation remains untapped. Cloud computing can have an impact on operations, customer relationships and industry value chains. Read this executive report to discover how the cloud can open the door to more efficient, responsive and innovative ways of doing business.
Tags : 
ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
IBM

Best Practices and Applications of TLS-SSL

Published By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : 
tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, networking
    
Symantec

Intelligent Client-Side Defense for Stolen Laptops

Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software

Top Use Cases for Desktop Virtualization (Infographic)

Published By: Citrix     Published Date: May 09, 2014
A wide range of business issues is driving IT toward desktop virtualization. One solution—Citrix XenDesktop with FlexCast technology—helps IT teams empower their entire workforces, one project at a time
Tags : 
citrix, virtualization, desktop virtualization, mobile workers, laptops, xendesktop, mobile, remote access
    
Citrix

Extending the benefits of desktop virtualization to mobile laptop users.

Published By: Citrix     Published Date: Sep 17, 2013
Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Download here to learn about XenClient, an innovative, clientside alternative for delivering virtual desktops, which allows IT to extend the benefits of desktop virtualization to laptop users whether they are working online or offline.
Tags : 
remote access, access control, mobile computing, mobile workers, messaging, virtualization, mobile device management
    
Citrix

How to keep your employees happy with their company PCs (without losing control of your IT)

Published By: Toshiba     Published Date: Jun 06, 2012
Your staff will be more content if they can install their choice of software. Here's how to give them that freedom while keeping control.
Tags : 
toshiba, mfp, printers, copiers, printers, employees, laptops, it management
    
Toshiba

Few use Tablets to Replace Laptops

Published By: Toshiba     Published Date: Oct 01, 2013
Workers still see value in laptops for running most critical apps, IDC survey says. Click here to find out why.
Tags : 
toshiba, laptop, mac, computers, mobile workers, remote workers, international workers, printers
    
Toshiba

How to Boost Windows 8 Performance

Published By: Toshiba     Published Date: Nov 12, 2013
There's an unassailable rule of computing: No matter how fast your computer is, and no matter how well it runs, you want it to run better. Click here to learn how to boost your Windows 8 experience.
Tags : 
windows 8, toshiba, windows, microsoft, copiers, copy machines, mfp, printers
    
Toshiba

How to Find Everything in Windows 8.1

Published By: Toshiba     Published Date: Nov 21, 2013
It's inevitable that upgrading to a new version of an operating system or application comes with a bit of a learning curve. With Windows 8.1, though--and its predecessor Windows 8--the curve is steep, and just finding simple tools and features can be a challenge.
Tags : 
toshiba, windows, windows 8, windows 81, microsoft, internet explorer, search bar, copiers
    
Toshiba

Could your Business Survive a Cryptor?

Published By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones
    
Kaspersky

When Cryptors Attack: Timeline of a Ransomware Infection

Published By: Kaspersky     Published Date: Feb 06, 2017
The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
Tags : 
cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack, hacker detection
    
Kaspersky

How to Detect Ransomware Before it’s Too Late with AlienVault USM

Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

Video: Hewlett-Packard Global Procurement Goes Digital with DocuSign -- Saving Time, Money

Published By: DocuSign     Published Date: Feb 13, 2017
"As HP digitized its contracting process with DocuSign, it went from 23 steps down to 7. Contracts are signed in 4 days down from 23 days—a 93% improvement in turnaround time. ""Our workforce is mobile; our salesforce is mobile. People want to do things on their laptops, tablets and smartphones. DocuSign enables us to do that. It is a digital enterprise solution."" -- Nick Gunn, SVP of Global Corporate Services at Hewlett-Packard. See more of their story.
Tags : 
    
DocuSign

Customer Success Stories: Unified Endpoint Management

Published By: VMware     Published Date: Feb 24, 2017
End users expect to be able to work anywhere, at any time, and from any device. Additionally, they expect a similar experience for accessing work apps and data across all their devices—desktop, laptop, tablet, and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices. A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. VMware AirWatch® Unified Endpoint Management™ provides IT with a comprehensive view of asset inventory and full lifecycle management of endpoints across the organization. Read more to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Portuguese)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: The Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

The Heartbleed Bug: How To Protect Your Business with Symantec

Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec

Recorded Webinar: Optimizing SMB HR with Technology

Published By: BambooHR - HR Software     Published Date: May 28, 2013
HR’s role varies from cheerleader to counselor to Chief Culture Officer- we get it! Tracking employee data in spreadsheets is a headache you don’t have time for, we make it simple- to free you up for more meaningful work. Watch the webinar!
Tags : 
hris, human resources, employee data, talent management, pto, time off management, hr software, employee management
    
BambooHR - HR Software

Best Practices and Applications of TLS/SSL

Published By: Symantec Corporation     Published Date: Oct 03, 2013
White Paper Published By: Symantec Corporation Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing Web browser sessions, but it has widespread application to other tasks.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Website Security in Corporate America

Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Your Phone System Is Ready for Retirement If...

Published By: CompareBusinessProducts     Published Date: Feb 27, 2015
One sign that your phone system is getting obsolete is when your spare parts are available on order only, and it takes a week for the items to arrive. Our infographic unveils the other symptoms!
Tags : 
phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
    
CompareBusinessProducts
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.