mobile data

Results 126 - 150 of 683Sort Results By: Published Date | Title | Company Name

Digital Content Security Pocket Guide

Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe

eBook: Connect the Cloud

Published By: Oracle     Published Date: Feb 21, 2018
The new integration demands of cloud, mobile, API and IoT technologies require a unified approach to integration that spans multiple integration channels. As the volume, variety, and velocity of data increases it is becoming more important to maintain effective communication among all elements of the architecture. Planning your cloud, hybrid, and on-premises integration needs? This free e-book will show you how the Oracle Cloud Platform for Integration can help you extend what is possible.
Tags : 
    
Oracle

The Drivers and Benefits of Edge Computing

Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric

The Drivers and Benefits of Edge Computing

Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric

"IDC Technology Spotlight: Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking,

Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable

Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking, and Security

Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable

Workforce Visibility

Published By: Sage People     Published Date: Jan 26, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions.
Tags : 
    
Sage People

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft

The Ultimate Guide to Omnichannel Loyalty

Published By: CrowdTwist     Published Date: Jan 09, 2018
In order for brands to build meaningful relationships with customers, they need to adopt an omnichannel strategy. A successful omnichannel loyalty program will connect customers to a brand across all touchpoints seamlessly. It will go beyond one-dimensional discounts, instead offering deeply personal and authentic customer experiences that will yield stronger engagement and higher spend among customers. Learn how to: - Extend customer touchpoints - Leverage mobile insights - Reward for social engagement - Utilize data to drive personalization
Tags : 
    
CrowdTwist

Protecting sensitive corporate data against the full spectrum of mobile risk

Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout

Patient Engagement: A foundational strategy based on interviews with healthcare decision makers

Published By: IBM Watson Health     Published Date: Nov 20, 2017
Strong patient engagement leads to improved population health, a better experience of care, and lower healthcare costs. Even so, few healthcare organizations have a well-defined patient engagement strategy, according to research by IBM Watson Health. Read this whitepaper and learn why healthcare organizations should create a comprehensive patient engagement strategy, what each component of such a strategy entails and how to take the steps required to build an effective patient engagement program. From patient portals, telemedicine, and mobile health, to data sharing, automation tools and cognitive computing, you’ll gain the ability to leverage valuable tools for increasing patients’ involvement in their own health outcomes.
Tags : 
patient outreach, patient relationship management, patient experience, population health management, cognitive computing, data, data sharing, healthcare costs
    
IBM Watson Health

Japanese - MobileIron Access One Pager

Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron

Part III of III: MobileIron and Microsoft Intune – March 2017 Detailed Comparison

Published By: MobileIron     Published Date: Nov 14, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : 
mobileiron, microsoft strategy, data analysis, efficiency, webinar
    
MobileIron

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron

MobileIron Access One Pager

Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron

SmartPaper: The next wave of business intelligence for the data-driven enterprise

Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM

Making Intelligent Decisions About Identities and Their Access

Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM

Upgrade Your Security with Mobile Multi-factor Authentication

Published By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : 
user authentication, mobile multi factor authentication, data flows, security, it strategies
    
IBM

Agility Without Compromise with Juniper SDN

Published By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks

Secure the SaaS Tsunami

Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin

Oracle SPARC T8 and SPARC M8 Architecture

Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle

Software in Silicon: Enabling Secure Infrastructures for the Real-Time Enterprise

Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle

A Smarter Process Approach to Accelerating Customer Engagements with Mobile and Social

Published By: IBM     Published Date: Oct 19, 2017
The Smarter Process platform is IBM’s solution for reinventing business operations in a way that infuses every process with intelligence and expertise to deliver greater customer centricity, which in turn fuels top-line growth. It incorporates Business Process Management, Case Management, Operational Decision Management and Process Analytics, along with Process Discovery and Design with an objective of ensuring that customers find it easy to do business and that every interaction includes positive touch points. Within the context of this new imperative, accessing cloud efficiencies, leveraging mobile for greater engagement, mining big data for insights, and enhancing customer relationships via social media, are proving to be critical and interrelated strategies.
Tags : 
customer engagement, mobile, social, bpm, case management
    
IBM

Oracle SPARC T8 and SPARC M8 Architecture

Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX

Software in Silicon: Enabling Secure Infrastructures for the Real-Time Enterprise

Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.