devices

Results 301 - 325 of 1807Sort Results By: Published Date | Title | Company Name

Buyer beware. Not all flash storage solutions are the same.

Published By: HPE Intel     Published Date: Jan 11, 2016
A famous architect once said that the origin of architecture was defined by the first time “two bricks were put together well.” And the more bricks you have, the more important putting them together well becomes. The same holds true in our data centers. The architecture of our compute, storage and network devices has always been important, but as the demands on our IT infrastructures grow, and we add more “bricks,” the architecture becomes more critical.
Tags : 
    
HPE Intel

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security, data management
    
Cisco

Buyer's Guide for Extended Collaboration

Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks

Buyers Guide to Small Business Phone Systems

Published By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : 
cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant, paging and intercom, crm, mobile computing, smart phones, wireless phones, customer relationship management, video conferencing
    
Cisco

Buyers Guide: Mobile Workforce Management Solutions

Published By: Xora, A ClickSoftware Company     Published Date: May 20, 2014
Discover what features mid-market businesses must evaluate when selecting a MWM solution
Tags : 
xora, mid market business, mobile workforce managements, mwm, mobile phones, smart phones, tablets, mobile devices, enterprise applications
    
Xora, A ClickSoftware Company

Buying into Mobile Security

Published By: Lookout     Published Date: Mar 28, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting.
Tags : 
mobile, security, lookout, risks
    
Lookout

Buying into Mobile Security

Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout

BYOD and Beyond--Unify visibility and control of wired and WLAN network

Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
Download this paper and think beyond BYOD access by considering the critical need to have unified visibility, concurrent control of wired and wireless networks.
Tags : 
byod, bring your own device, wireless lan, wlan, mobile devices, mobile workforce, mobility, wireless, business technology
    
HP OMG Mobile Workforce

BYOD and Beyond: How To Turn BYOD into Productivity

Published By: Aerohive     Published Date: Jul 03, 2012
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. This white paper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
byod, mobility, productivity, business technology
    
Aerohive

BYOD Best Practices: a Practical Guide for Implementing BYOD Programs

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation, business technology, cloud computing
    
Good Technology Corporation

BYOD Done Right is a Win-Win for Workspace Mobility

Published By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
mobile management, mobile devices, enterprise management, information technology, best practices, business optimization, application integration, employee performance, productivity, project management
    
VMware AirWatch

BYOD Policy Implementation Guide

Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software

BYOD Policy Implementation Guide

Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management, intrusion detection, application integration, mobile device management
    
Absolute Software

BYOD Policy: It’s Protection, Not Paperwork

Published By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, mobile computing
    
Enterprise Mobile

CA Technologies Unveils New Mainframe Machine Learning Capabilities at CA World '16

Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies

Call Recording with BlackBerry Smartphones

Published By: BlackBerry     Published Date: Oct 03, 2012
As the workplace grows more mobile by the minute, you may be wondering how to extend this to your mobile devices. In this resource, uncover how mobile communications fit into your call recording strategy, and what it means for your enterprise.
Tags : 
mobile device management, mobile communications, blackberry, call recording, call recording strategy, wireless, business technology
    
BlackBerry

Call Recording with BlackBerry Smartphones

Published By: Blackberry     Published Date: Oct 03, 2012
As the workplace grows more mobile by the minute, you may be wondering how to extend this to your mobile devices. In this resource, uncover how mobile communications fit into your call recording strategy, and what it means for your enterprise.
Tags : 
mobile device management, mobile communications, blackberry, call recording, call recording strategy
    
Blackberry

Campus Network Design Guide

Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks

Can "Easy" Really Be Built Into ERP Software

Published By: Plex Systems     Published Date: Aug 15, 2014
The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.
Tags : 
erp systems, security, manufacturing, communications. data entry, networking
    
Plex Systems

Can BYOD deliver real ROI?

Published By: Fujitsu     Published Date: Aug 01, 2017
Regardless of which model you choose, BYOD needs to be carefully planned to get the full benefits without increasing costs. Decisions must also be made about whether to accept some cost increases as a trade-off for benefits that improve your bottom line. To be successful, both for the business and for employees, BYOD must balance conflicting expectations to create an equilibrium in which both parties get what they want – while also each giving something in return. Many factors will influence the true cost of your BYOD program, but the decision should not be based purely on cost considerations. Research by analyst firm Forrester found that nearly 70% of companies increased their bottom line revenues as a result of deploying BYOD programs5 – so some cost increases may well be a price worth paying.
Tags : 
hardware costs, devices, byod, technology, online communities, intel, productivity goals
    
Fujitsu

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Can Your Security Keep Up With 70,000 New Malware Strains a Day?

Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink

Capitalizing on Cross-Channel Retail Opportunities

Published By: IBM     Published Date: Oct 23, 2012
With widespread use of mobile devices and social media, today's consumers are connected and empowered like never before. This white paper explores the challenges that face retail chief marketing officers (CMOs) and their divisions.
Tags : 
ibm, analytics, personalized marketing, customer loyalty, consumer behavior, customer loyalty, business technology
    
IBM

Capitalizing on Digital Media in the Age of Transparency, Social Networking and the 24/x News Cycle

Published By: The FeedRoom     Published Date: Jul 22, 2009
Social media, blogs and the proliferation of mobile devices have dramatically altered the corporate communications landscape. It's no longer a question of whether your PR team should get involved, but rather how to get involved and what digital media practices will best serve your goals.
Tags : 
youtube, twitter, myspace, linkedin, social networking, blog, blogs, wiki, feedroom, ugc, user generated content, public relations marketing, digital media
    
The FeedRoom
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.