RSS feed Get our RSS feed

News by Topic

mobile access

Results 376 - 400 of 401Sort Results By: Published Date | Title | Company Name
By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
     HP and Intel ®
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Box     Published Date: Jun 11, 2014
Watch this webcast to learn what's really happening in the mobile space and how you can use mobile tech to transform your business. You'll hear examples of innovative companies and what they're doing and learn to use new technology to optimize how your employees access and share info, allowing them to get more work done.
Tags : box, mobile, enterprise, mobile tech, technology
     Box
By: Epicor     Published Date: Mar 19, 2015
This report, based on a survey of over 200 organizations, examines the top pressures that organizations are facing in business management, uncovers adoption rates of mobile ERP, and illustrates the benefits that mobile access can provide.
Tags : erp, roi, business management, mobile access
     Epicor
By: Epicor     Published Date: Mar 19, 2015
Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency and deepening customer engagement. Without mobile access, system users are disadvantaged by needing to return to a desktop, often after a job is completed, to enter data relating to that job and get information about other jobs. Frequently that information is not entered at all and become more of a hindrance to user adaption of your ERP investment.
Tags : mobile access, erp, office systems, customer engagement
     Epicor
By: Epicor     Published Date: Feb 09, 2018
As mobile devices become increasingly essential to our working lives, your business—and your enterprise resource planning (ERP) system—must connect to these vital tools or risk losing to the competition. When employees can use their preferred devices to access information on demand, distributors like you can improve employee collaboration, increase productivity, and deliver exceptional customer service. In this Epicor eBook, you’ll discover how mobile technologies can integrate with your ERP solution to help you: • Instantly give customers what they want • Make faster business decisions • Use the right tools to enhance sales productivity Download the eBook to learn how else you can capitalize on greater mobility and grow your distribution business.
Tags : distribution, mobility
     Epicor
By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: MobileIron     Published Date: Feb 26, 2018
Die Herausforderung: Absicherung der mobilen Cloud
Tags : 
     MobileIron
By: MobileIron     Published Date: Feb 26, 2018
El reto de la seguridad móvil en la nube
Tags : 
     MobileIron
By: MobileIron     Published Date: Feb 26, 2018
La sfida della sicurezza nell'ambiente cloud-mobile
Tags : 
     MobileIron
By: VMware AirWatch     Published Date: Nov 12, 2015
Today’s savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight and enable employees to complete a business task at a moment’s notice, on whichever device is nearby. This whitepaper will outline the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Au cours des dernières années, le terme « BYOD » ( Bring Your Own Device » ou « Utilisation de terminaux personnels ») a gagné en popularité dans le monde du travail, et les terminaux mobiles sont devenus très courants dans de nombreuses entreprises. Toutefois, ce terme englobe bien plus que cette nouvelle tendance. L’utilisation de terminaux personnels n’est qu’une partie d’une évolution plus importante et plus profonde : celle de la consumérisation de l’informatique qui remonte au début des années 2000. À cette époque, presque tout le monde avait un ordinateur personnel qui permettait de travailler chez soi en dehors des heures de travail. Nous avions tous les avantages de ces terminaux choisis avec soin et nous profitions d’un grand confort d’utilisation par rapport aux terminaux d’entreprise préparés par le service informatique.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
In den vergangenen Jahren ist der Begriff „BYOD“ am Arbeitsplatz immer populärer geworden, weil zahlreiche Unternehmen auf mobile Geräte umgestiegen sind. BYOD ist aber nicht nur ein begrifflicher Trend oder einfach nur eine Abkürzung. Es handelt sich um einen viel größeren und stärker verwurzelten Trend: die stärkere Orientierung der IT an Verbraucherprodukten, die seit Anfang des 21. Jahrhunderts zu beobachten ist. Damals verfügten nahezu alle über einen PC, mit dem sie nach Feierabend zu Hause arbeiten und dabei die Vorteile nutzen konnten, die ihnen das eigene, vertraute und sorgfältig ausgewählte Gerät gegenüber dem von der Unternehmens-IT bereitgestellten System bot.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine "BYOD" è diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell'acronimo. Il BYOD costituisce un aspetto di un trend molto più ampio e radicato: la consumerizzazione dell'IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l'orario di ufficio, sfruttando tutti i vantaggi derivanti dall'uso di dispositivi di propria scelta, più agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Prácticas recomendadas para implementar un programa BYOD productivo En los últimos años, «BYOD», que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los términos más utilizados en la empresa, al generalizarse el uso de los dispositivos móviles en muchas organizaciones. Sin embargo, además de ser un término que está de moda, su significado no es el de unas simples siglas. BYOD forma parte de una tendencia más amplia y arraigada: la consumerización de las TI, que se remonta al principio de la década de 2000. Por aquel entonces, casi todos disponían de un ordenador personal, con lo que podían trabajar desde casa fuera del horario laboral, así como disfrutar de las ventajas de utilizar los dispositivos de su elección y con los que se sentían más cómodos en lugar de usar los dispositivos corporativos que les proporcionaban los departamentos de TI.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
The New BYOD: Best Practices for a Productive BYOD Program (This article is in Japanese)
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : innovation, best practices, mobile device, security, mobile workforce
     VMware AirWatch
By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
     Dell EMC
By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
     U.S. Cellular
By: CBRE     Published Date: Aug 02, 2017
MobileIron Access Overview
Tags : mobileiron, access, software solutions
     CBRE
By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : (delete)mobile management, system solutions, data security, software management, personal data management, device management
     IBM
By: Lookout     Published Date: Mar 28, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data.
Tags : mobile, security, modern, organizations, byod, lookout
     Lookout
By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
     Lookout
By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And it’s not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobility’s promise.
Tags : hyland, offline access, mobility, remote access, mobile access, business applications
     OnBase by Hyland
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics