RSS feed Get our RSS feed

News by Topic

bring

Results 1051 - 1075 of 1131Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : iag, identity and access governance, identity management, compliance, security, it management
     NETIQ
By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
     HP and Intel ®
By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations
     Cisco
By: Cisco     Published Date: Mar 25, 2015
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
     Cisco
By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management
     Cisco
By: Cisco     Published Date: Aug 27, 2015
Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best
Tags : cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans
     Cisco
By: Cisco     Published Date: Nov 17, 2015
The days of punching in and zoning out are gone. Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
     Cisco
By: QTS Data Centers     Published Date: Jun 09, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : cloud security technologies, cloud security purchases, bring your own device, mobile device management, security
     QTS Data Centers
By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : ge healthcare, clinical data, healthcare technology, image management technology, medical imaging, data management
     GE Healthcare
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Adobe     Published Date: Feb 22, 2016
Customer experience has officially taken center stage in 2016. Adobe partnered with Econsultancy to bring you the 2016 Digital Trends report. After surveying 7,000 marketing professionals, it’s clear that marketers are more focused than ever on creating relevant and contextually targeted customer experiences.
Tags : adobe, digital trends, econsultancy, monitization, engagement, mobile, search marketing, email marketing
     Adobe
By: Adobe     Published Date: Mar 03, 2017
Download our new white paper, Retail Stores of the Future, to learn how you can bring the best of online shopping to brick-and-mortar stores. You’ll see how new digital marketing technologies and strategies can be applied to in-store interactions—so you can create immersive experiences everywhere your customers go. Read the white paper now to discover: • How retailers are blending innovative technologies with traditional shopping • Four key approaches they’re using to build Stores of the Future • The interactive tools they’re employing to enrich in-store experiences
Tags : customer experience, digital technology, retail, customer needs, retail experience, future of retail
     Adobe
By: Delphix     Published Date: Apr 14, 2015
Current test data management solutions are flawed in at least one key dimension. Technologies in the emerging Data as a Service (DaaS) category bring the benefits of virtualization to application data, delivering high-quality test data with both speed and efficiency.
Tags : 
     Delphix
By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : data security, byod, corporate security, mobile data security, user experience, security
     IBM MaaS360
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
     VMware SD-WAN by VeloCloud
By: Harvard Business School     Published Date: Feb 12, 2015
To thrive, companies need to innovate. And to innovate, companies need collaboration. Discover how bringing together diverse expertise, experience, and points of view can help you maximize contributions from every member of your team—and drive new levels of success.
Tags : high potentials leadership, high potential leaders, high-impact or fast-track individuals, top performers, harvard business school, executive education program, collective genius, linda hill
     Harvard Business School
By: IBM     Published Date: Apr 07, 2015
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : ibm, odm, operational, decision, maker, analytics, update, v8.7
     IBM
By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
     MobileIron
By: IBM     Published Date: Jul 07, 2015
Through the IBM Network Innovation Centers, IBM brings together networking services and technology capabilities together to demonstrate infrastructure agility.
Tags : demonstrations, network innovation, networking solutions, interoperability, manageability, scalability, performance
     IBM
By: VMware AirWatch     Published Date: Oct 02, 2015
Ultimately, technology can minimize compromises so that everyone becomes a winner. In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility is a compromise-free approach, and how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : byod, mobility, analysis, enablement
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : vmware, byod, workspace mobility, airwatch
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Au cours des dernières années, le terme « BYOD » ( Bring Your Own Device » ou « Utilisation de terminaux personnels ») a gagné en popularité dans le monde du travail, et les terminaux mobiles sont devenus très courants dans de nombreuses entreprises. Toutefois, ce terme englobe bien plus que cette nouvelle tendance. L’utilisation de terminaux personnels n’est qu’une partie d’une évolution plus importante et plus profonde : celle de la consumérisation de l’informatique qui remonte au début des années 2000. À cette époque, presque tout le monde avait un ordinateur personnel qui permettait de travailler chez soi en dehors des heures de travail. Nous avions tous les avantages de ces terminaux choisis avec soin et nous profitions d’un grand confort d’utilisation par rapport aux terminaux d’entreprise préparés par le service informatique.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
La mobilità resta un'opportunità strategica di primo piano per tutti i tipi di in quanto può rendere di rendere le imprese più competitive migliorando la produttività dei dipendenti oppure creando modalità innovative di coinvolgimento dei clienti. Per realizzare questa opportunità, la Enterprise Mobility deve fornire agli utenti un'esperienza di utilizzo fluida su più dispositivi e offrire un'area di lavoro sicura per le applicazioni di importanza critica. Per sostenere gli utenti di dispositivi mobili e la base clienti, le aziende devono attivare in modo sicuro le capacità BYOD (Bring Your Own Device, ovvero "Porta il tuo dispositivo") e self-service tramite una piattaforma solida, in grado di adattarsi adattarsi a nuovi processi.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence
     VMware AirWatch
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics