devices

Results 1526 - 1550 of 1649Sort Results By: Published Date | Title | Company Name
Published By: Blackberry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
    
Blackberry
Published By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance
    
HP - Intel®
Published By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : 
byod, healthcare, bring your own device, mobile devices, security risk, security compliance
    
HP - Intel®
Published By: CDW     Published Date: Nov 12, 2012
Johnson County Community College overhauls network infrastructure to support students' personal devices.
Tags : 
cdw, byod, network infrastructure, explosion of byod, personal devices
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk
    
CDW
Published By: CDW     Published Date: Sep 15, 2014
WHEN IT COMES TO DATA CENTER OPTIMIZATION, IT’S NOT JUST WHAT YOU KNOW. IT’S WHO YOU KNOW. That’s why we partner with leading vendors like EMC. They offer a wide range of devices for primary storage, archiving, backup, recovery and data center management. And with years of experience in EMC deployments, CDW has the experts and the expertise to make them work for you. Together, we give our customers access to the latest technologies that help optimize their data centers to keep their organizations running smoothly.
Tags : 
data, optimization, experts, backup, recovery, technologies, organizations, vendor, experience, deployment, management, storage, archiving, technologies, recovery
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Apps have made mobile devices standard equipment for today’s workforce. And with the right strategy for selecting and customizing them, apps can change the way you work.
Tags : 
mobility, mobile workers, byod, productivity
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.
Tags : 
mobility, apps, strategy, platform, tmm, risk management, productivity
    
CDW
Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®
Published By: Lenovo and Microsoft     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre
    
Lenovo and Microsoft
Published By: Oracle     Published Date: Oct 25, 2013
Learn how to provide the same experience across all devices and avoid the need for duplicate data entry, which might limit access to customer data or create errors.
Tags : 
leverage, mobility, sales, customer data, data, devices, mobile, tablet, smart phone, laptop, relationship management, sales
    
Oracle
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats
    
Norse
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: IBM     Published Date: Jan 09, 2014
IBM Systems Director 6.3 has just been released. Read the white paper and see how this new revision can improve usability with a more logical interface, as well as simplify installation for the program and associated plug-ins. Also learn how its extended functionality enhances control over physical systems, virtualized resources and storage devices.
Tags : 
system director 6.3, system director, virtual machine, installability functionality, energy management, ibm systems, ibm
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
cognitive internet, iot, iot apps, intent data
    
IBM
Published By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : 
design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations, deployment
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Mobile and virtualized workloads, cloud applications, big data, heterogeneous devices: they are all growing in your business, demanding previously unimagined capacity and performance from your servers and data center fabric. And that demand is not slacking. Your employees, applications, and competitive advantage increasingly depend on it. Those servers and applications need to be fed. And if you have not started planning for 40 gigabits per second (Gbps) to the server rack, you will need to soon.
Tags : 
    
Cisco
Published By: Adobe     Published Date: May 15, 2014
From web-enabled wristwatches to high-resolution tablets, new mobile devices are popping up all the time, and customers expect your content to work flawlessly and look great across all of them. But that doesn’t mean you have to keep re-inventing your digital assets for every new innovation.
Tags : 
adobe, web design, responsive web design, brand awareness, customer engagement, web analytics, smartphone, tablet, online marketing, web experience, web presence, roi, conversion rates, traffic, web development, website development, internet marketing
    
Adobe
Published By: Adobe     Published Date: Feb 12, 2016
Personalization is no longer just about using data to learn about your customers and deliver relevant content. As channels and devices evolve, personalization is also about using your data to deliver experiences that every customer finds engaging.
Tags : 
adobe, design, personalization, device, engagement, crm & customer care, marketing research
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
Download our Adobe guide, Conducting the Cross-Channel Symphony, to discover new strategies for creating, managing, and orchestrating cross-channel campaigns. With expert advice from cross-channel maestros, you’ll be equipped to create beautiful marketing music that gets rave reviews from your customers. Read our guide now to learn how you can: • Integrate processes and data for cross-channel campaign success • Create personalized, contextual campaigns across channels and devices • Leap ahead of the competition with authentic cross-channel experiences
Tags : 
cross-channel, adobe, marketing, channel integration
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
With all the devices and channels out there, it’s harder than ever for companies to maintain a consistent brand experience. There are more ways for customers to connect with companies than ever before. And they expect each and every interaction to feel connected, cohesive, and personal. For marketers to connect the dots for customers, they need to fully understand the customer journey. Read The Sum of Its Parts to learn: • How the customer experience can be your competitive edge • The importance of providing consistent experiences across all channels • Four strategies for future-proofing your customer experience
Tags : 
customer experience, brand experience, branding, customer interaction
    
Adobe
Start   Previous    52 53 54 55 56 57 58 59 60 61 62 63 64 65 66    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: