mobile data

Results 1 - 25 of 655Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Comcast Business     Published Date: Feb 06, 2019
Just like your business, technology never stops advancing. Each year, there are new ways that technology can automate processes, lower costs, and enhance customer and employee satisfaction - all with the goal of increasing revenue! And while it can be difficult to change how your business works, leaving old methods behind and embracing new technology can help lead your business to more success and growth.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
restaurants, quick-serve restaurants, qsr, fast food, convenience food, restaurant technology, qsr technology, guest experience, pos, digital entertainment, wifi, television, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
Retail has been transformed by technology in multiple ways, from the way customers interact with retailers to how products are offered and acquired. Indeed, the entire shopping experience has been redefined and expanded to enable customers to purchase products anytime, anywhere, with any device, from any number of retailers. Consumers’ changing shopping behaviors and their reliance on technology enables retailers to reach a wider swath of potential buyers, moving well beyond the borders of their physical store locations to new geographies and populations. That said, retailers must understand how to use technology effectively to draw in customers and entice them to purchase, as well as help them improve their operations and enable new, innovative ways to keep customers coming back.
Tags : 
retail, shopping, retailers, wifi, retail technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking
    
Comcast Business
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: Forcepoint     Published Date: Jan 07, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
mobile users, data loss protection, cloud security, digital transformation, cyber security, distributed offices, distributed networks
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Sage People     Published Date: Jan 04, 2019
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people
Tags : 
    
Sage People
Published By: Forcepoint     Published Date: Jan 03, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
mobile users, data loss protection, cloud security, digital transformation, cyber security, distributed offices, distributed networks
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 03, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Published By: Sage EMEA     Published Date: Dec 19, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people better an
Tags : 
    
Sage EMEA
Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q418
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Digital transformation encompasses both technological and human components. While many initiatives focus on ensuring that a company’s multi-cloud infrastructure is agile enough to meet changing demands around cloud mobile, Internet of Things (IoT), and big data, it’s equally important to empower business workers with the modern digital tools they need to be successful today. Artificial intelligence and machine learning can play a vital role on both of these fronts. In fact, 78 percent of CIOs and senior IT leaders are already looking to AI to address complexity,1 and by 2019, 30 percent of IT service desks will utilize machine learning to free up support capacity.2 The magnitude of change has forced companies to take stock of the experience they offer employees. As digital natives3 enter and advance in the workforce, talent retention is now a top priority. These workers expect to have the best tools; 93 percent of millennials cited modern and up-to-date technology as one of the most
Tags : 
    
BMC ASEAN
Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q119
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: HERE Technologies     Published Date: Dec 06, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 06, 2018
adsquare offers brands insights into customer behaviors and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee