device

Results 1 - 25 of 2588Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: HP Inc.     Published Date: Jun 20, 2019
Today’s IT departments face a unique set of challenges. On one hand, they have evolved from helpdesk support teams to key business enablers and must maintain increasingly complex IT landscapes while combatting significantly larger cyber security threats. On the other hand, they have to manage constant change with fewer resources and static, or minimally-increasing, budgets. As a result, many are looking to reduce costs while increasing efficiency and productivity. Some, in fact, are looking to Device as a Service, or DaaS. If you're looking for more reasons to convince your CFOs that DaaS is a smart move, download the whitepaper to explore five big benefits of deploying a best-in-class DaaS solution.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 20, 2019
How offloading some or all of your daily device monitoring and security can increase uptime and decrease IT spend
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 20, 2019
As working environments and styles change, organizations must adapt IT to keep devices secure.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 20, 2019
Four billion people now generate four quintillion bytes of data every day - and with the number of IoT devices set to increase to three times the global population by 2022 - volumes will only continue to rise. The challenge is processing the data. This is why machine learning, deep learning and all the other developing forms of AI must deliver the analytics toolset businesses need to compete.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 20, 2019
DaaS interactive interview: Why HP implemented its own Device as a Service solution
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 20, 2019
Reduce costs and increase efficiency under the new "as a service" model: Research findings from IDC To understand the true value of adopting the as-a-service model, International Data Corp. (IDC), a market intelligence provider, conducted an HP-sponsored survey of organizations with at least 750 end-user devices across nine countries, and found that device management services can curtail costs, reduce IT workload and support a more streamlined and efficient way of doing business.
Tags : 
    
HP Inc.
Published By: ExpertVoice     Published Date: Jun 20, 2019
Are we in the midst of a retail apocalypse? In spite of doomsday headlines, brands that focus on the customer experience continue to succeed. A good retail experience can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, only 35% of retail employees feel as though training is effective. That’s a scary number, because without a well-trained retail sales force, consumers are left to their own devices.
Tags : 
    
ExpertVoice
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 19, 2019
WE LIVE IN A WORLD WHERE WORK IS NO LONGER A PLACE WHERE YOU GO. It’s what you do — a dynamic activity that people expect to accomplish anywhere, anytime, on any device. Supporting today’s workforce requires a digital platform that empowers productivity and ensures security and management at scale everywhere: on site, on the road, or in the cloud. According to IDC, by 2020, mobile workers will account for 72 percent of the U.S. workforce. And they won’t be just checking email. These workers want to be productive 24/7. That means access to data, documents, and corporate apps anywhere, anytime, on any device. Enterprises, however, are struggling to allow more workers to use additional devices from a multitude of locations.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Zscaler     Published Date: Jun 19, 2019
You can’t impose controls on something you don’t own. And in today’s cloud- and mobile-oriented enterprise, no one truly owns the network. The Internet has become the one network that every corporate worker uses and that no corporate IT can control. The emergence of cloud, ubiquitous networks, smartphones and smart (or dumb) networked devices are wreaking havoc over the traditional command-and-control IT mode of operation. This shift is different from anything we’ve experienced before, because nobody owns the network.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
When’s the last time someone said they liked VPN? The way we work has changed. We access apps from any device, from anywhere, and we expect a fast, seamless experience when we do so. Now, enterprises are able to deliver this, and improve security with cloud services called Zero Trust Network Access (ZTNA) technologies. A modern alternative to VPN.
Tags : 
    
Zscaler
Published By: Sierra Wireless     Published Date: Jun 19, 2019
In addition to e-books, on-demand video and GPS devices, one of the future technological innovations envisioned by AT&T in its famous early 1990s series of “You Will” commercials was an Electronic Toll Collection (ETC) system that enabled drivers to wirelessly pay their tolls as they drove through a toll booth. While that prediction was perhaps not as bold as the others (Europe began developing similar ETC systems in the 1980s), today we take for granted E-ZPass in the U.S. and similar systems where drivers can enter toll roads, HOV lanes, bridges and tunnels without having to stop at a tollbooth to pay. Typically, these systems require a driver to put an OBU (On Board Unit, which can be called transponder or “edge” IoT device) in their vehicle and, when their vehicle passes through a toll booth, the toll booth wirelessly connects to the edge to automatically deduct the toll from their bank account.
Tags : 
    
Sierra Wireless
Published By: Mist Systems     Published Date: Jun 19, 2019
With a surge of 25,000 devices and counting, Dartmouth College needed its new Wi-Fi to be fast, reliable and as smart as its students. In response, Dartmouth, based in Hanover, N.H., began deploying new campus-wide Wi-Fi from Mist Systems last summer. It expects to complete the project throughout the campus in three to five years, according to Bryan Ward, a network engineer at Dartmouth. The IT department manages the Wi-Fi through a cloudbased wireless LAN and can already see the benefits of better coverage and easier management. But the team faced difficulties when embedding the new system with Dartmouth's centuries-old campus architecture, which is less supportive of campus-wide Wi-Fi than modern architecture. The following interview has been edited for length and clarity.
Tags : 
    
Mist Systems
Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
It’s time to look ahead. We have outlined 5 predictions that we believe marketers should be preparing for in the next 5 years. In this whitepaper, we’ll cover how: • Blockchain will become a greater core component of marketing. • Display advertising as we know it will finally die. • Cross-device identification will become a necessary part of omnichannel marketing. • Voice re-emerges as a distinct channel and internet interface. • All marketing will be done in real time.
Tags : 
    
Emarsys - APAC
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
    
Forcepoint
Published By: Ahead     Published Date: Jun 05, 2019
Digital Business Demands Better Software, Faster In your organization, you’ve probably heard questions like these asked of the application development and/or infrastructure and operations organizations. > Why can’t our software development teams keep up with new business requirements? > Why are we always waiting on infrastructure teams? > Why do our business initiatives become outdated before their required software is even deployed? > Is our software development team aligned with corporate goals like engaging younger consumers on their mobile devices?
Tags : 
    
Ahead
Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust
Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee