RSS feed Get our RSS feed

News by Topic

mobile use

Results 326 - 350 of 791Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
     Absolute Software
By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : entrust, enterprise authentication, security, identity security
     Entrust Datacard
By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : entrust, identitityguard, enterprise security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : identity guard, enterprise, securing identities, corporate network, mobile platforms, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas
     Entrust Datacard
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications
     Microsoft Windows Phone
By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security
     Microsoft Windows Phone
By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : unica, email, emarketing, esp, email trends, social media, sms, spam
     Unica
By: Zebra Technologies     Published Date: Mar 25, 2010
Mobile printing provides a series of quality improvements and timesaving benefits that are often overlooked in route automation, but can have a significant impact on the bottom line. This white paper will: • Describe uses for mobile printing in route accounting applications; •Provide return on investment calculation tools to measure the financial impact mobile printing can have; • Demonstrate how mobile printing processes can improve billing, distribution, and customer service operations; • Detail how on-demand thermal printing can reduce forms expenses; • Provide an overview of mobile printer and wireless communications options for route accounting systems. Read on to see how your route delivery and sales staff can make more stops and fewer errors each day by using mobile printing to support their work.
Tags : zebra technologies, dsd, manufacturing, mobile printing, wireless printing
     Zebra Technologies
By: Aternity     Published Date: Apr 30, 2012
Are you currently in the process of making line-of-business applications accessible from mobile devices or do you have plans to deploy custom mobile applications in the near future? "The Rise of the Mobile Workforce: Gain Control of End User Experience" will provide you and your team with the use cases, insight, and best practices you need for gaining control of end user experience of mobile applications.
Tags : aternity, workforce, technology, mobile, end user experience, mobile technology, eue, it management
     Aternity
By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : technology, mobile, management tools, end-user experience, eue, application performance, smartphones
     Aternity
By: Adobe     Published Date: Sep 08, 2011
Join Christophe Coenraets as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex & LiveCycle. Learn how to minimize development time and reuse components across device platforms.
Tags : adobe, mobile apps, ios, android, mobile applications, christophe coenraets, adobe flash builder, device platforms
     Adobe
By: Adobe     Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
Tags : adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
     Adobe
By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience
     Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Simple, secure ways to deliver a great experience for remote users. As mobile workstyles transform the way people and businesses work, remote access is becoming more important than ever. In enabling people to work anywhere, on any device, you need to meet IT’s requirements for security and manageability—but it’s just as important to consider user experience. Citrix, a leader in mobile workstyles, has long recognized that remote access has to address the needs of users as well as IT. With an entire team dedicated to user experience, Citrix has developed secure-by-design remote access solutions that make it simple for people to work the way they choose, anywhere and on any device, to deliver optimal productivity and business impact for their organizations
Tags : network management, network secuirty, network optimization, information technology, best practices
     Citrix Systems
By: Cotendo     Published Date: Nov 18, 2011
Learn what's slowing down your dynamic mobile websites and mobile apps-and how to fix it. In this on-demand webinar, join Mobile IT leaders discussing best practices and a new case study on how to speed up the mobile end user experience.
Tags : mobile web best practices, mobile content delivery, mobile acceleration, mobile web performance, mobile website performance, mobile cdn, mobile cloud, mobile application performance
     Cotendo
By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery, mobile acceleration, mobile cdn, cotendo mobile
     Cotendo
By: OpenText     Published Date: May 23, 2012
Download this report and discover: . Positive impact of mobile web content optimization on customer engagement . Key success factors for building mobile websites that delight customers while contributing to top-line revenue results
Tags : mobile marketing, web content optimization, metric-driven mobile marketing, pinch-zooming, mobile user engagement, mobile user experience
     OpenText
By: LogMeIn     Published Date: Jul 18, 2014
A research report on streamlining the customer experience with mobile chat.
Tags : mcommerce, live chat, boldchat, logmein, customer support, mobile trends, mobile users, crm solutions/software
     LogMeIn
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics