mobile

Results 351 - 375 of 3879Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile, security, devices, users, bluecoat
    
Blue Coat Systems
Published By: Red Hat     Published Date: Dec 09, 2013
Businesses are tapping into the innovative potential of their companies with Red Hat Enterprise Linux. Standardize your enterprise platform across multiple hardware architectures, hypervisors and cloud providers to help IT meet the needs of your business.
Tags : 
red hat, data, mobile, cloud, it congestion, deliver flexibility, business expectations, disparate hardware
    
Red Hat
Published By: Oracle     Published Date: Aug 08, 2013
With Oracle CRM you can sell on the road with ease.
Tags : 
mobile app, crm, oracle
    
Oracle
Published By: Oracle     Published Date: Dec 31, 9999
Employee Services Systems and Technology Manager Trent Filth out talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
With Oracle CRM you can sell on the road with ease.
Tags : 
oracle, native outlook client, outlook, client, crm, sales
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Employee Services Systems and Technology Manager Trent Filthout talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Avaya     Published Date: Feb 06, 2015
This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.
Tags : 
unified communications, managing uc, uc becoming more powerful and useful
    
Avaya
Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: Panasonic     Published Date: Aug 04, 2016
Field service organizations are leveraging mobile technology to enhance their service capabilities and provide more value for their customers. Mobility is the new normal for enterprise, line-of-business applications like field service. If your organization still relies on manual data entry or paper-based processes, or if your mobile technology is aging and out of date, you have put your own business at a competitive disadvantage.
Tags : 
mobility, mobile computing, enterprise, technology, efficiency
    
Panasonic
Published By: Panasonic     Published Date: Aug 04, 2016
Maximizing productivity in challenging work environments is not easy, and that’s why selecting the right mobile computing solution is crucial. It’s not enough to simply hand your workers or technicians any mobile device; if the hardware can’t operate reliably in their typical work environment, they might as well be working with pen and paper.
Tags : 
mobile computing, best practices, productivity, mobile device
    
Panasonic
Published By: Panasonic     Published Date: Aug 04, 2016
Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.
Tags : 
cyber risk, security, mobile security, best practices
    
Panasonic
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
IT services such as mobile devices, smart applications and cloud-based services are transforming the way we live, work and communicate. Global technology services and businesses are embracing digital transformation, introducing Intelligent Spaces to unleash worker productivity and accelerate the pace of business. The workplace plays a critical role in an organization’s digital transformation. Forward-looking organizations recognize that you can’t build a digital business without building a digital workplace.
Tags : 
    
Hewlett Packard Enterprise
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today there’s no such thing as “one size fits all” when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: IBM APAC     Published Date: May 18, 2017
Welcome to IT as a Service For Dummies, IBM Limited Edition. IT as a Service is the emerging technique that gives technology leaders the flexibility of providing the right set of services to the business. The world of IT is changing dramatically. Businesses are increasingly discovering that IT services are becoming the foundation for the customer experience. IT as a Service isn’t simply a new delivery model for applications. Instead, IT as a Service is a new approach to providing an array of modular services that are targeted to solve changing business problems. While services can be as straightforward as compute or storage in the cloud, they can also be used to complex solutions. Other services may include microservices or integration services that enable a business to quickly create new solutions to help service customers in a more creative and efficient manner.
Tags : 
service, dummies, ibm, cloud, mobile
    
IBM APAC
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: