devices

Results 1351 - 1375 of 1646Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : 
enterprise information, secure, android, apple ios, microsoft window tablets, flexibility
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.
Tags : 
email, mobile, collaboration, smartphone, tablets, productivity
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.
Tags : 
blackberry, byod, citrix xenmobile, control, security
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : 
mobility, management, boyd, secure app, data delivery
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
enterprise mobile, executive checklist, security, byod
    
Citrix
Published By: IBM     Published Date: Aug 21, 2013
Until now, marketers have been limited to two relatively uninspired options for sending direct communications to consumers on their mobile phones: SMS (a.k.a., text messaging), and text-only, imageless email on devices like the BlackBerry and Palm Treo. But with the introduction of Apple’s iPhone and competitor operating systems like Google’s Android and Palm’s Pre/Pixi now offering similarly rich user experiences, email marketers have a huge opportunity to reach consumers anywhere, any time, on their mobile devices.
Tags : 
email marketing, enterprise marketing management, email performance, mobile marketing, mobile reach, marketing channels
    
IBM
Published By: Oracle     Published Date: Nov 01, 2013
This Executive Brief explores the role of service and support in creating great customer experiences, the service goals market leaders use related to customer experience, the Oracle approach for empowering new service experiences, and how Oracle’s service solutions can help organizations create and manage their own great customer experiences across all channels, touchpoints, and devices.
Tags : 
zenithoptimedia, oracle, executive strategy series, customer experience, empowering people, take initiative, power your brand, oracle service solutions, customer experience impact, cei, service and support experience, lasting customer relationships, sales interactions, ignored customers, efficiency, acquisition, improve self-service, improve productivity, cross-channel support, decrease operational costs
    
Oracle
Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls
    
Symantec
Published By: Cisco     Published Date: Jan 05, 2015
As the corporate landscape becomes increasingly mobile, and workers collaborate across a growing range of devices, organizations are implementing an agile and secure unified communications infrastructure. Active deployment of UC technology solutions has been on the rise among enterprises; however, adoption among midsize businesses has been notably slower. Yet in seeking ways to do more with less, midsize organizations are increasingly turning to the cloud and converged networks to provide UC solutions.
Tags : 
cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private, communication, technology solutions
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index™ (Cisco VNI™) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.
Tags : 
application services, innovation, employee productivity, technically, devices, network
    
Cisco
Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.
Tags : 
office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management, data protection
    
Nativeflow
Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company’s intranet portal available to employees on the go? Do employees need mobile access to your back-office systems while ensuring data on mobile devices is secure? Do users want to use their own mobile devices to access corporate data and applications? Download the datasheet to get in depth approaches to addressing these challenges.
Tags : 
intranet portal, on the go, mobile access, back-office systems, secure, ensure data, mobile devices, datasheet, access corporate data, applications
    
Nativeflow
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage, data protection, edit shared files
    
Nativeflow
Published By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : 
kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
    
Kaspersky
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving
    
Smarsh
Published By: GENBAND     Published Date: Oct 31, 2014
Don’t throw away your CS1000 investment! Avoid the cost of buying an entirely new phone system and have the peace of mind that comes with a fully supported, simple and secure solution with a fully committed product roadmap. Extend the life of your investment for years to come with GENBAND.
Tags : 
application, server, communication, analog, digital, ip phones, branch consolidation, deployed, migration, mobility, network, devices, tco
    
GENBAND
Published By: EarthLink Business     Published Date: May 15, 2014
This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.
Tags : 
earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers, byod, workforce security
    
EarthLink Business
Published By: Silk Road Technology     Published Date: Jul 30, 2014
Five years ago, many HR representatives put their hands over their ears and pretended they’d never heard the words “social media.” However, social media – which encompasses any internal or external online outlet that allows for two-way dialogue and includes websites such as blogs, Facebook, Instagram, LinkedIn, Pinterest, Twitter, Yelp, and YouTube – has only become more pervasive. In fact, according to Laura Friedel, a partner in Levenfeld Pearlstein’s Labor and Employment Practice Group, 75 percent of employees currently access social media on their mobile devices while at work and 67 percent do so more than twice a day.
Tags : 
silkroad, social media, legal risks, facebook, instagram, linkedin, pinterest, twitter, yelp, employees
    
Silk Road Technology
Published By: Riverbed     Published Date: Jul 15, 2014
Virtual desktop infrastructure (VDI) offers organizations the means to centrally manage and deliver desktops as a service to reduce costs, increase data security, and streamline desktop management while enabling anytime, anywhere access across a wide variety of devices. IT consumerization trends such as BYOD (bring your own device) and device diversity are accelerating VDI adoption, which is expected to double over the next year.
Tags : 
troubleshooting, virtual desktop, infrastructure, vdi, deployments, manage it, byod
    
Riverbed
Published By: HP     Published Date: May 14, 2014
Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : 
hewlett packard, cloud, mobile, remote, data recovery, disaster, failure
    
HP
Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure
    
Riverbed
Published By: HP     Published Date: Aug 26, 2014
More and more enterprises are adopting “bring your own device” (BYOD) initiatives to let employees choose the device they use. The HP BYOD solution, based on the HP Intelligent Management Center (IMC), offers a single-pane-of-glass network and user management solution for your entire network. With an HP BYOD solution, you can efficiently manage your entire infrastructure, secure personally owned devices, and monitor BYOD traffic. HP IMC also goes beyond the unified BYOD essentials by delivering converged management across various networks—physical and virtual, wired and wireless, and Software-Defined Networking (SDN). Discover how.
Tags : 
byod, holistic, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Windows 10 is Microsoft’s first truly mobile operating system designed to work seamlessly across the unified desktop and mobile devices’ platform. This mobile first, cloud first platform redefines how organizations treat desktop and device management by allowing IT to take full advantage of the new enterprise mobility management (EMM) capabilities. Download the infographic to learn how VMware AirWatch® provides the most comprehensive solution to get your organization Windows 10 ready.
Tags : 
    
VMware
Start   Previous    48 49 50 51 52 53 54 55 56 57 58 59 60 61 62    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: