mobile solutions

Results 51 - 75 of 317Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Nov 14, 2017
Watch this interactive video to get an overview of Mobileiron's products and the access it can offer you!
Tags : 
mobileiron, software solutions, mobility management
    
MobileIron
Published By: Mitel     Published Date: Nov 08, 2018
Travailler dans le secteur des technologies de l’information n’a jamais été aussi excitant, vu la façon dont la technologie améliore nos modes de travail et de communication au quotidien. Qu’il s’agisse des terminaux mobiles, des analyses en temps réel ou du cloud, les technologies actuelles s’adaptent parfaitement aux objectifs de l’entreprise et lui permettent d’augmenter sa productivité, de réduire ses coûts et d’améliorer le service à sa clientèle. L’ère du numérique redéfinit nos rôles en tant que dirigeants d’entreprise. De nos jours, il est indispensable de développer une plate-forme robuste proposant des solutions de communication et de collaboration simples et fluides.
Tags : 
wireless communication, audio conferencing, communications systems, video conferencing, cloud-based unified communications, enterprise voice, unified messaging, collaboration portal, business communications
    
Mitel
Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: CA Technologies     Published Date: Nov 02, 2016
Since Aternity was founded in 2005, the business world has changed dramatically. Mobile devices, software as a service (SaaS) and the cloud have taken up permanent residence in today’s enterprise IT department. Aternity stays on the cutting edge by rapidly delivering innovative End User Experience Monitoring solutions that can monitor any application on any device—physical, virtual or mobile—for any user.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
A guide to help investigate mobile testing solutions, and trigger structured discussions and decisions. Download now to learn more!
Tags : 
    
HP Enterprise Business
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
With the modern workforce becoming more mobile, geographically disperse and digital, HR is looking for innovative solutions to modernize employees experiences. Discover a quick roadmap to deliver a digital workplace for your organization.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: ClickExpress     Published Date: May 01, 2013
Even if you have only 15 mobile workforce employees, you can reduce costs and improve the customer’s experience using optimization software. Today, it’s easy because you don’t even have to provide dedicated mobile devices to your field employees, just an app. But how do you avoid difficult transitions for workers, long implementation times, and solutions that don’t work as you really needed? This paper walks you through the 6 steps to successful decision making.
Tags : 
6 essential, mobile, workforce, management, software, customer, experience, optimization, software, implementation
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise, solutions
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
Deploying a mobile workforce solution used to be a major undertaking. Today, it’s easy. You don’t need any specialized devices; management software is cloud-based, and training is short and simple. In other words, obstacles of the past have disappeared, and now is the time to implement mobile workforce solutions for organizations with between 15 and 250 mobile workforce. In this brief, you’ll see why it’s easier than ever to implement software solutions for mobile workforce.
Tags : 
mobile, workforce, solution, organizations, mobile, implement, software
    
ClickExpress
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
    
Veracode
Published By: VMware     Published Date: Jul 24, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
If you’re looking to improve sales performance, optimize ecommerce, implement marketing automation, expand social media, deliver better customer service, or utilize accurate Configure-Price-Quote (CPQ) – it’s all Oracle. And, the icing on the cake? All of these solutions are integrated, but modular. We offer a breadth of solutions that you can not only buy individually, but can also easily integrate with existing or additional solutions as your business needs grow. Adapt your customer experience strategy to new technology in Forrester's navigate the future of CRM in 2017 Report.
Tags : 
mobile, artificial intelligence, chatbots, internet of things, integrated suite, cloud solutions
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 12, 2017
Enterprises tend not to view project management as a holistic process. Much like the disparate systems they have in place, they see a disparate collection of issues. They typically look to solve specific pain points with single applications. Rather than migrate an entire enterprise to a new system, they are looking to manage a problem spot and have it flow into a specific component (e.g., cost, human capital leverage, or how demand is driven) as needed. In many cases, however, the pain points are symptoms of a larger issue, and to remove them the situation must be viewed in the context of the full project life cycle. Oracle Project Portfolio Management (PPM) Cloud, part of the integrated suite that is Oracle ERP Cloud, not only does this, but it’s also built with the user in mind… solving the PPM pain points through role-based analytics, social collaboration, optimization, costing, control, and mobile solutions for today’s project team.
Tags : 
ppm, project portfolio management, erp, oracle, cloud
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Cisco     Published Date: Dec 27, 2017
New disruptive digital technologies are changing the face of workplace as well as worker expectations. The rapidly evolving 21st-century workforce is becoming increasingly mobile, contract-based, and technology savvy. Corporate real estate, IT, and HR leaders need to improve their work environments to suit these evolving needs, or they risk losing their employees to competition. This paper: • Discusses why your employees are disengaged • Discusses the six trends that will dominate the workforce of the future • Describes how Cisco® Workforce Experience solutions can help enable these rich workforce experiences
Tags : 
    
Cisco
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee