device

Results 1 - 25 of 2571Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Jan 20, 2017
?De nos jours, les clients échappent à vos systèmes de gestion de la relation client (CRM) et aux technologies de suivi du parcours de navigation qui vous permettaient de les suivre. Ils naviguent désormais de device en device et de canal en canal, imprévisibles et souvent anonymes. Ils se sont également éloignés de l’entonnoir des ventes, qui autrefois les conduisait lentement mais sûrement de la découverte à l’achat.
Tags : 
    
Adobe
Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks
Published By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security, business technology
    
iboss
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: Aria Systems     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world >
Tags : 
    
Aria Systems
Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology
    
Avaya
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: DocuSign     Published Date: Apr 24, 2018
DocuSign can help you deliver customer experiences (CX) that will have your users (customers, employees, vendors, and others) rewarding you with positive responses and greater loyalty. This How-To Guide shows how you can apply electronic document review and approvals to empower the very best interactions from any device.
Tags : 
    
DocuSign
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : 
citrix, mobility, security, data
    
Citrix Systems, Inc.
Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: Movable Ink     Published Date: Apr 01, 2016
Do your emails look great on mobile devices? In the UK, 70% of email opens occur on smartphones and tablets. You know you should be building responsive emails, but where do you start? Download ‘10 Quick Design Hacks for Responsive Emails’ to discover simple ways to create great-looking emails for mobile devices and see real life examples of how brands are making a big impact on a small screen.
Tags : 
email marketing, contextual marketing, mobile marketing, responsive email marketing, email design
    
Movable Ink
Published By: CDW Vmware     Published Date: Aug 02, 2012
In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.
Tags : 
modernize, desktop, data, application, access, device, seamlessly, integrate, modernization, cio, vmware, department, user, infrastructure, manage, migrate, new, platforms
    
CDW Vmware
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, it management
    
Aerohive Networks
Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure, enterprise applications
    
Riverbed
Published By: Plantronics     Published Date: Mar 09, 2015
This whitepaper gives you the key 10 steps will provide you with a framework for planning, deploying and enhancing the audio element of your communications strategies.
Tags : 
voice tools, communications tools, communications strategies, unified communications, uc devices, communication platform
    
Plantronics
Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, networking, enterprise applications, storage
    
Smarsh
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee