mobile devices

Results 1 - 25 of 722Sort Results By: Published Date | Title | Company Name
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Juniper APAC DWA Cloud Leads July 2017
Published By: VMware AirWatch     Published Date: Jul 19, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Jul 24, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: Netsuite     Published Date: Jul 24, 2017
Baseball has always collected in-game data. However, until recently, fans didn’t have easy access to the various statistics that coaches used for key decisions important for the development of the players and success on the baseball field. It’s not unlike how traditional business intelligence is delivered. Data and reports are set aside for a few experts who determine what is important for you. Today, baseball statistics are widely available during broadcasts on TV, PCs and mobile devices. Basic data displays like inning and score are enhanced with metrics meaningful to students of the game, such as pitch speed, strikeout percentages and hit zones. It’s a good example of vital information being delivered in real-time, on demand and in context.
Tags : 
    
Netsuite
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : 
mobility, productivity, employee satisfaction
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Progressive companies of all sizes today are taking advantage of new, web-based technologies to reduce IT complexity and increase their competitiveness. Mobile apps and devices that provide anywhere, anytime connectivity and cloud infrastructure that enables seamless, scalable growth give them the speed and flexibility to grow quickly and expand into new markets. In this whitepaper you will find three examples of forward-thinking franchise owners and entrepreneurs that are growing their businesses and positioning themselves for the future with unified communications solutions. These franchises are: McDonald's RE/MAX Fix Auto Download now to learn more!
Tags : 
franchise, mcdonald's, mobile app, positioning, communication solutions, 8x8
    
8x8 Inc.
Published By: SAS     Published Date: Jun 05, 2017
"How do you make your brick-and-mortar stores as smart as your website – so when customers walk in the door, you recognize them and cater to their individual tastes? What’s the key to making in-store shopping as frictionless for your customer as online shopping? Read this research summary from the International Institute for Analytics to get started. You’ll learn how to use analytics to gain advanced insight from the Internet of Things: tracking chips, in-store infrared traffic monitors, interactive kiosks and customer mobile devices, to name a few. With analytics, you’ll identify who’s walking in your store, understand their behavior and preferences, and create engaging experiences for your connected customers at every turn. "
Tags : 
    
SAS
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : 
akamai, akamai gaming, infrastructure, distribution channel, technological advancements
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Today’s mobile users are spoiled. They demand rich, desktop quality experiences tailored to their devices and delivered at lightning fast speeds. And while these “always on” users represent a tremendous business opportunity, satisfying their high expectations requires overcoming complex mobile delivery challenges. In this e-book, we review three key mobile delivery challenges and explain how you can overcome them by optimizing for fast APIs, mobile apps, and mobile sites to increase engagement, revenue, and customer loyalty. Download today to learn how your business can Meet Today’s Mobile Mandate.
Tags : 
mobile adoption, customer loyalty, customer engagement, increase revenue
    
Akamai Technologies
Published By: Zoom     Published Date: May 15, 2015
This is a case study about a proactive approach to protect mobile devices and networks for individuals, businesses and governments.
Tags : 
    
Zoom
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault
Published By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
With new technologies, new opportunities often emerge, especially in business. Download this asset to learn more about how social media and mobile devices, is changing the ways businesses interact with customers and the ways in which customers desire to be engaged. Sponsored by: HPE and Intel®
Tags : 
best practices, opportunities, mobile device, customer engagement, business technology
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Feb 23, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
wireless management, wireless, communications, business practices, small business
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.