RSS feed Get our RSS feed

News by Topic

mobile access

Results 51 - 75 of 400Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Nov 14, 2017
Watch this interactive video to get an overview of Mobileiron's products and the access it can offer you!
Tags : mobileiron, software solutions, mobility management
     MobileIron
By: MobileIron     Published Date: Sep 26, 2017
The shift toward modern mobile-cloud technologies is forcing organizations to completely rethink their approach to endpoint security. For instance, while credential-based security is enough to secure access in an IT-controlled desktop environment, it doesn’t transfer to the mobile-cloud world
Tags : mobileiron, mobile, cloud, enterprise, security, endpoint security
     MobileIron
By: MobileIron     Published Date: Sep 26, 2017
Today’s modern enterprise requires a comprehensive, unified platform like MobileIron Access, which is designed from the ground up to secure mobile apps, devices, and cloud services. MobileIron makes it easy to transform business by securing critical enterprise resources including desktop PCs, mobile devices, modern apps, and cloud services — all from a single point of control.
Tags : mobileiron, mobile, cloud, security, enterprise security
     MobileIron
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : technology, best practices, data, enterprise
     Microsoft
By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
     Juniper Networks
By: Oracle Analytics     Published Date: Oct 06, 2017
Empowered with mobile and cloud-based access to a myriad of products and services, customers now have a variety of options at their fingertips with regards to partnerships. Enterprises that do not follow the ever-changing tastes and preferences of their customers, or that wait too long to react, will fall behind and fail. Across functions, business professionals readily require big data tools and insights to understand and serve these customers. It is no longer an option for business users to rely on IT to deliver customer and other relevant analytics. On the flipside, handing the analytics reins entirely to business users can make governance nearly impossible. Organizations must find balance in a new approach in which IT mostly governs and curates data while business users are empowered to derive insights from data mostly ontheir own without delay.
Tags : 
     Oracle Analytics
By: Dell SB     Published Date: Jan 24, 2019
Creators, inventors and designers across the world’s industries rely on Dell Precision workstations to expand the horizons of the possible and bring their ideas into reality. Some of the most noteworthy features of the Precision workstation family include: • A broad solution portfolio that ranges from mobile devices to rack and tower workstations • Innovative designs that enhance user experiences • Power to enable emerging technologies • The industry’s most comprehensive service and support offering, Dell ProSupport • A world-class ecosystem of displays, input devices and accessories
Tags : 
     Dell SB
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Semplificare la sicurezza e la gestione per le app di livello enterprise e il BYOD
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
L'app non è più semplicemente un metodo per comunicare. Rappresenta il nuovo punto critico di coinvolgimento, il volto dell'azienda, se non addirittura l’elemento chiave della fidelizzazione o meno del cliente.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Le concept d’API (interface de programmation d’applications) n’est certes pas neuf, mais il est actuellement en pleine mutation : poussées par les exigences de la mobilité et du Cloud, de plus en plus d’entreprises ouvrent en effet leurs ressources informatiques aux développeurs externes.
Tags : 
     CA Technologies
By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
     MobileIron
By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
     MobileIron
By: Aternity     Published Date: Oct 20, 2015
This exclusive guide (a $1295 value), featuring Gartner Research, provides an overview of the five key capabilities for improving enterprise mobile workforce productivity beyond traditional monitoring. It also give you access to Gartner’s Market Guide for Mobile Application Performance Monitoring and Industry use case examples on how Aternity Mobile APM has improved both customer and workforce end user experience. The guide also explains how, when it comes to actually measuring and improving the end user experience, Aternity Mobile APM uniquely addresses what counts most to the mobile workforce – the performance of the app as it renders on any device.
Tags : mobile workforce, end user experience, aternity, mobile apm, application performance
     Aternity
By: VMware AirWatch     Published Date: Jul 19, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
     VMware AirWatch
By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
     Okta
By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
     Citrix ShareFile
By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
     VMware
By: CA Technologies     Published Date: Aug 22, 2017
Effectively supporting these new business demands has become more complex and challenging. The increased use of mobile devices alone is driving exponential growth in transaction volumes. A customer pushes a button on his or her cell phone, for example, to check a bank balance. That single transaction triggers a cascade of transactions as the request is validated and data is accessed, retrieved and then sent back to the customer.
Tags : storage, systems, network, applications, data, automation, ca technologies
     CA Technologies
By: Acronis EMEA     Published Date: May 18, 2015
Download this datasheet to discover the main benefits of Acronis Access Advanced.
Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
     Acronis EMEA
By: Acronis EMEA     Published Date: May 19, 2015
Download this paper to uncover the steps needed to mobilise your workforce and become more productive.
Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
     Acronis EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics