corporate app

Results 51 - 75 of 204Sort Results By: Published Date | Title | Company Name

Three Essential Elements of Next-Gen Endpoint Protection

Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike

Efficient, Cost-Effective VDI Expansion on Converged Infrastructure

Published By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC

Finding Tech Talent Using Slack, Reddit and Meetup

Published By: Entelo     Published Date: Sep 06, 2017
Today's tech candidates are actively interacting and sharing their work on different websites, networks, and forums. As more of these channels surface, recruiters have the advantage to connect with more people in real-time, build a community based on shared interests, and to develop their employer identity among candidates. This webinar will cover recruiting on Slack, Reddit, AngelList, and Meetup – a communication tool, aggregated news site and forum, Q&A social network, startup platform, and online portal for interest groups. Michelle Lusen, senior corporate recruiter at Slack, will join us for the webinar to share her best practices for connecting with candidates. In this webinar, you'll learn: How to establish rapport and develop a Slack community of candidates using private and public communication channels Where to look on Reddit and AngelList to find people most interested in hearing about your open role Tactics to identify and engage with domain experts on Meetup How to navi
Tags : 
    
Entelo

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management
    
Enterprise Mobile

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile

Six Technology Tactics to Promote Corporate Responsibility

Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents how to use technology systems to help your business promote corporate social responsibility.
Tags : 
corporate social responsibility, enterprise applications, enterprise resource planning, epicor, corporate responsibility, green it, csr, globalization
    
Epicor

Application Ready Network Guide Microsoft Exchange 2007

Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Microsoft® Exchange® Server is the undisputed industry leader in corporate messaging. With the release of Microsoft Exchange Server 2007, not only does Exchange continue to provide rich, effi cient access to e-mail, calendars, attachments, contacts, and more, but Exchange Server 2007 adds some exciting infrastructure and performance improvements as well. F5’s comprehensive Application Ready infrastructure for Exchange Server 2007 allows organizations to easily provide additional performance, security and availability, to ensure maximum ROI with the minimum amount of work.
Tags : 
microsoft exchange 2007, application ready network guide, microsoft exchange server, corporate messaging, roi, infrastructure optimization, application security, it management
    
F5 Networks Inc

Increase Visibility to Boost Security

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd

Increase Visibility to Boost Security

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd

Creating an Enterprise Risk Management (ERM) program is a value-add for your organization

Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv

The truth about motivation and what makes healthy habits stick

Published By: Fitbit     Published Date: Jan 23, 2018
How can a corporate wellness program get your employees motivated? Motivation is essential to maintaining positive behavior changes, especially when it comes to achieving health goals. But how do employees get motivated, and most importantly, stay motivate? Simply put—it depends on the person and why they want to get healthy. Download our white paper, “The truth about motivation and what makes healthy habits stick” to learn: • The ins and outs of motivation • The importance of motivational interviewing • What motivation means for wellness incentives You’ll also get your hands on motivational messaging tips to apply to the various fitness levels at your company. Get your team on a path to wellness today. Download the motivation whitepaper now!
Tags : 
    
Fitbit

Radicati 2018 Corporate Web Security Market Quadrant

Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a “Top Player” for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a “Top Player” in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, ”Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection.” They also cited that, “Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoint’s solution is leading edge.”
Tags : 
    
Forcepoint

IDC Report

Published By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
    
Gigamon

Users want Mobile File Access. IT Managers want Control. You can have Both.

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape

Bring Your Own Device Policy Consideration

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications, business technology, virtualization
    
Good Technology Corporation

New Guide: 10 Essential Mobile App Security Questions

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation

Forbes Insights: How Prepared Is Your Data Center for the Digital Era?

Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Technology is a fast-moving target, and organizations need agility and flexibility to compete. By modernizing your data center and maximizing the value of your corporate data, your company can gain those qualities. In this Forbes Insights checklist, learn how to derive value from your corporate data and embrace three elements of a modernized data center: an agile data infrastructure, a modern approach to data protection, and intelligent data center operations.
Tags : 
    
Hitachi Vantara

Magic Quadrant for Cloud Strategic Corporate Performance Management Solutions

Published By: Host Analytics     Published Date: Aug 01, 2017
Summary Strategic corporate performance management solutions support the office of finance's efforts to manage organizational performance and strategy. Application leaders should use this Magic Quadrant to identify vendors that are a good match for their business needs. Strategic Planning Assumptions By 2020, at least 75% of organizations will seek to improve the accuracy and actionability of financial planning and analysis by using operational data from multiple business domains. By 2020, at least 25% of organizations will achieve more collaborative, continuous and consistent financial planning and performance management by closely linking key operational and financial planning processes.
Tags : 
    
Host Analytics

Magic Quadrant for Cloud Financial Corporate Performance Management Solutions

Published By: Host Analytics     Published Date: Aug 01, 2017
Cloud financial corporate performance management solutions help the office of finance manage the financial close and apply appropriate controls throughout the accounting cycle. Application leaders should use this Magic Quadrant to identify vendors that are a good match for their business needs. The 2017 Gartner Magic Quadrant for Strategic CPM solutions provides valuable insights into the latest market trends, the current Leaders, and key vendor evaluation criteria. Download the Gartner report to learn: Why cloud has become the preferred deployment model Who the key vendors are and how they compare Why mega vendors no longer dominate the market Best practices in evaluating and selecting a vendor
Tags : 
    
Host Analytics

DCIG 2014-15 Deduplicating Backup Appliance Buyer’s Guide

Published By: HP     Published Date: Feb 02, 2015
Ever-increasing data volumes driven by the constant growth in both structured and unstructured data coupled with the ever decreasing costs of storage capacity on a per GB basis are continuing to put a strain on corporate backup abilities. While other backup and data optimization technologies offer some relief, deduplicating backup appliances have become the go to solution. They provide a quick, largely non-disruptive plug-and-play solution that alleviates backup pain, reduces storage consumption by up to 20x and have become a proven frontrunner in the ongoing battle to improve the backup experience.
Tags : 
    
HP

DCIG 2014-15 Deduplicating Backup Appliance Buyer’s Guide

Published By: HP     Published Date: Feb 11, 2015
Ever-increasing data volumes driven by the constant growth in both structured and unstructured data coupled with the ever decreasing costs of storage capacity on a per GB basis are continuing to put a strain on corporate backup abilities. While other backup and data optimization technologies offer some relief, deduplicating backup appliances have become the go to solution. They provide a quick, largely non-disruptive plug-and-play solution that alleviates backup pain, reduces storage consumption by up to 20x and have become a proven frontrunner in the ongoing battle to improve the backup experience.
Tags : 
    
HP

HP Converged Storage: Simplify and Optimize Your Virtualization and Cloud Deployment

Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®

Business Value of Managed Services

Published By: IBM     Published Date: Oct 10, 2013
As the primary focus of IT moves from increasing IT productivity through virtualization and cloud computing to enhancing business productivity, the biggest challenge that businesses face in executing corporate strategy is focusing the right people and resources on strategic initiatives. A key element in enhancing business productivity is driving down costs, which can help free up the funds needed to make strategic investments. Businesses also need a means to more effectively orchestrate how IT interacts with business processes and critical application environments. The solution lies in using managed services. Read here to find out more on how companies gained significant and quantifiable benefits from using managed services.
Tags : 
business value, it productivity, virtualization, cloud computing, enhancing productivity, business productivity, executing corporate strategy, strategic initiatives
    
IBM

Convergence, collaboration and culture: The evolution of governance, risk and compliance

Published By: IBM     Published Date: Jun 17, 2014
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.
Tags : 
ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.