devices

Results 1676 - 1700 of 1811Sort Results By: Published Date | Title | Company Name
Published By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : 
byod, healthcare, bring your own device, mobile devices, security risk, security compliance
    
HP - Intel®
Published By: CDW     Published Date: Nov 12, 2012
Johnson County Community College overhauls network infrastructure to support students' personal devices.
Tags : 
cdw, byod, network infrastructure, explosion of byod, personal devices
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk
    
CDW
Published By: CDW     Published Date: Sep 15, 2014
WHEN IT COMES TO DATA CENTER OPTIMIZATION, IT’S NOT JUST WHAT YOU KNOW. IT’S WHO YOU KNOW. That’s why we partner with leading vendors like EMC. They offer a wide range of devices for primary storage, archiving, backup, recovery and data center management. And with years of experience in EMC deployments, CDW has the experts and the expertise to make them work for you. Together, we give our customers access to the latest technologies that help optimize their data centers to keep their organizations running smoothly.
Tags : 
data, optimization, experts, backup, recovery, technologies, organizations, vendor, experience, deployment, management, storage, archiving, technologies, recovery
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Apps have made mobile devices standard equipment for today’s workforce. And with the right strategy for selecting and customizing them, apps can change the way you work.
Tags : 
mobility, mobile workers, byod, productivity
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.
Tags : 
mobility, apps, strategy, platform, tmm, risk management, productivity
    
CDW
Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®
Published By: Lenovo and Microsoft     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre
    
Lenovo and Microsoft
Published By: Oracle     Published Date: Oct 25, 2013
Learn how to provide the same experience across all devices and avoid the need for duplicate data entry, which might limit access to customer data or create errors.
Tags : 
leverage, mobility, sales, customer data, data, devices, mobile, tablet, smart phone, laptop, relationship management, sales
    
Oracle
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats
    
Norse
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: IBM     Published Date: Jan 09, 2014
IBM Systems Director 6.3 has just been released. Read the white paper and see how this new revision can improve usability with a more logical interface, as well as simplify installation for the program and associated plug-ins. Also learn how its extended functionality enhances control over physical systems, virtualized resources and storage devices.
Tags : 
system director 6.3, system director, virtual machine, installability functionality, energy management, ibm systems, ibm
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
cognitive internet, iot, iot apps, intent data
    
IBM
Published By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : 
design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations, deployment
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Mobile and virtualized workloads, cloud applications, big data, heterogeneous devices: they are all growing in your business, demanding previously unimagined capacity and performance from your servers and data center fabric. And that demand is not slacking. Your employees, applications, and competitive advantage increasingly depend on it. Those servers and applications need to be fed. And if you have not started planning for 40 gigabits per second (Gbps) to the server rack, you will need to soon.
Tags : 
    
Cisco
Published By: Adobe     Published Date: May 15, 2014
From web-enabled wristwatches to high-resolution tablets, new mobile devices are popping up all the time, and customers expect your content to work flawlessly and look great across all of them. But that doesn’t mean you have to keep re-inventing your digital assets for every new innovation.
Tags : 
adobe, web design, responsive web design, brand awareness, customer engagement, web analytics, smartphone, tablet, online marketing, web experience, web presence, roi, conversion rates, traffic, web development, website development, internet marketing
    
Adobe
Published By: Adobe     Published Date: Feb 12, 2016
Personalization is no longer just about using data to learn about your customers and deliver relevant content. As channels and devices evolve, personalization is also about using your data to deliver experiences that every customer finds engaging.
Tags : 
adobe, design, personalization, device, engagement, crm & customer care, marketing research
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
Download our Adobe guide, Conducting the Cross-Channel Symphony, to discover new strategies for creating, managing, and orchestrating cross-channel campaigns. With expert advice from cross-channel maestros, you’ll be equipped to create beautiful marketing music that gets rave reviews from your customers. Read our guide now to learn how you can: • Integrate processes and data for cross-channel campaign success • Create personalized, contextual campaigns across channels and devices • Leap ahead of the competition with authentic cross-channel experiences
Tags : 
cross-channel, adobe, marketing, channel integration
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
With all the devices and channels out there, it’s harder than ever for companies to maintain a consistent brand experience. There are more ways for customers to connect with companies than ever before. And they expect each and every interaction to feel connected, cohesive, and personal. For marketers to connect the dots for customers, they need to fully understand the customer journey. Read The Sum of Its Parts to learn: • How the customer experience can be your competitive edge • The importance of providing consistent experiences across all channels • Four strategies for future-proofing your customer experience
Tags : 
customer experience, brand experience, branding, customer interaction
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Epicor     Published Date: Feb 09, 2018
As mobile devices become increasingly essential to our working lives, your business—and your enterprise resource planning (ERP) system—must connect to these vital tools or risk losing to the competition. When employees can use their preferred devices to access information on demand, distributors like you can improve employee collaboration, increase productivity, and deliver exceptional customer service. In this Epicor eBook, you’ll discover how mobile technologies can integrate with your ERP solution to help you: • Instantly give customers what they want • Make faster business decisions • Use the right tools to enhance sales productivity Download the eBook to learn how else you can capitalize on greater mobility and grow your distribution business.
Tags : 
distribution, mobility
    
Epicor
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: