devices

Results 1326 - 1350 of 1646Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware AirWatch Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with VMware AirWatch, as well as conduct a Q&A session.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : 
citrix, enterprise, mobility, management, byod
    
Citrix Systems, Inc.
Published By: Rapid7     Published Date: Jan 10, 2013
In a January 2012 market research study, 71 percent of the businesses surveyed said that mobile devices have caused an increase in security incidents.
Tags : 
security, network security, cloud, mobile, cloud, byod
    
Rapid7
Published By: Rapid7     Published Date: Jul 24, 2013
As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.
Tags : 
rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security, blackberry security, threat protection
    
Rapid7
Published By: Rapid7     Published Date: Oct 15, 2013
This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.
Tags : 
rapid7, risk, security, real-time, infrastructure
    
Rapid7
Published By: SAS     Published Date: Apr 25, 2017
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis. The heart and soul of SAS Visual Analytics is the SAS® LASR™ Analytic Server, which ca
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Today, data is constantly flowing in and out of organizations from electrical and mechanical sensors, RFID tags, smart meters, scanners, mobile devices, vehicles, live social media, machines and other objects. Did you know that a modern plane with more than 10,000 sensors just in the wings is expected to generate more than 7 terabytes a day? And Bain predicts that by 2020 annual revenues could exceed $470 billion for the internet of things (IoT) vendors selling hardware, software and comprehensive solutions. Analysts believe that all of this data will drive a new type of industrial revolution – one that’s driven by highly accurate, real-time analysis, alerts and actions. Increasingly, machines will automate decisions and simply notify humans with instructions. Consider the promise of the IoT, where any object can be connected to the internet and continuously send and receive data. Gartner says that by 2020, 21 billion IoT devices will be in use worldwide.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 05, 2017
For organizations to succeed with the onslaught of devices, sensors and tools that innovation garners, data must no longer be treated as a byproduct but instead as an asset. And data-driven innovation must start at the top. That's what Michael Schrage, Fellow at MIT Sloan School's Initiative on the Digital Economy, said during the Harvard Business Review webinar, Leadership and Big Data Innovation. Find out why data experimentation, governance and culture are part of the next leadership challenge for organizations.
Tags : 
    
SAS
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Businesses increasingly have more remote workers. Whether working remote full-time, part-time or just while traveling for business, these workers rely heavily on their own mobile devices to stay connected, yet they still need to stay connected to their teams for meetings in their office. Now, more than ever, there’s a strong demand for a video conferencing solution that can provide a simple and instant connection from the office to the home and on the go. Download now to learn more!
Tags : 
lifesize, cloud, video, conference, remote, mobile, connection
    
LifeSize, a division of Logitech
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or just traveling for business, these workers rely heavily on their own mobile devices to stay connected to their teams, as well as to participate in meetings. Now more than ever, remote workers want (and expect) face-to-face interaction—and they want a seat at the meeting. There’s a strong demand for a video conferencing solution that can provide a simple and instant connected experience from the office to the home and on the go. Download now to learn more about cloud video conferencing.
Tags : 
lifesize, cloud, cloud video, remote, mobile, conferencing
    
LifeSize, a division of Logitech
Published By: Avocent     Published Date: Mar 06, 2011
Download this Free Paper to learn how the Avocent ACS advanced console server offers the most feature-rich set of capabilities in modern console servers. The ACS console server provides the scalability, reliability and security a company requires to control and manage servers and other networked devices.
Tags : 
manage servers, avocent, emerson, pbx, device management, it infrastructure management, remote management
    
Avocent
Published By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : 
damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
Damballa
Published By: Damballa     Published Date: Oct 03, 2014
In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most
Tags : 
damballa, advanced threats, failsafe, true positives, risk engines, infections
    
Damballa
Published By: CDW     Published Date: Dec 03, 2012
The fact is that IT may be in the dark about who is using mobile devices to access company data.
Tags : 
mobile device management, cdw, mobile
    
CDW
Published By: CDW     Published Date: Dec 03, 2012
Smartphone, tablet computer and ultrabook purchases number in the hundreds of millions per year. This onslaught of devices underscores the move to mobility in many organizations. Read on to learn how CDW helps in building end to end mobile strategy.
Tags : 
cdw, mobile application management, mam, security, mobile workers. mobile security, productivity, mobile productivity, efficiency
    
CDW
Published By: Arbor Networks     Published Date: Jan 31, 2013
This paper will look at DDoS attacks in detail. It will illustrate the attack vectors being used and describe why the threat to organizations is greater than ever before
Tags : 
anti-ddos, products, services, critical, business environment, ips devices, firewall, arbor network
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks
    
Arbor Networks
Published By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices
    
Citrix
Published By: Citrix     Published Date: May 13, 2014
Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. With Citrix XenDesktop, you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.
Tags : 
citrix, mobile devices, mobile applications, mobile apps, mobile workers, remote access, remote users
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.
Tags : 
enterprise, mobility, challenge, data, windows, datacenter, web, solution
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
mobile, enterprise, application gap, pcs, byod, data
    
Citrix
Start   Previous    47 48 49 50 51 52 53 54 55 56 57 58 59 60 61    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: