RSS feed Get our RSS feed

News by Topic

native

Results 351 - 375 of 445Sort Results By: Published Date | Title | Company Name
By: Nativeflow     Published Date: Feb 25, 2014
Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.
Tags : office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management
     Nativeflow
By: Nativeflow     Published Date: Feb 25, 2014
Is your company’s intranet portal available to employees on the go? Do employees need mobile access to your back-office systems while ensuring data on mobile devices is secure? Do users want to use their own mobile devices to access corporate data and applications? Download the datasheet to get in depth approaches to addressing these challenges.
Tags : intranet portal, on the go, mobile access, back-office systems, secure, ensure data, mobile devices, datasheet
     Nativeflow
By: Nativeflow     Published Date: Feb 25, 2014
Are your employees using WhatsApp? Is mobile messaging taking over an ever-growing portion of your enterprise communications? Is your enterprise running into compliance considerations around messaging? Learn about approaches to addressing these challenges so that your employees can communicate on the go and your enterprise data will be protected.
Tags : whatsapp, enterprise communication, employees, enterprise data protection, enterprise data, mobile protection, mobile messaging
     Nativeflow
By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
     Nativeflow
By: Nativeflow     Published Date: Jun 06, 2014
Download the solution brief to learn more about protecting your organization’s enterprise data.
Tags : nativeflow, healthcare, enterprise app, physicians, mobile app, doctors, healthcare solutions, data encryption
     Nativeflow
By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Riverbed     Published Date: Jul 15, 2014
Any strategy for managing the network infrastructure must include a direct understanding of how well the network is playing its role in application and service delivery. This is the realm of Application-aware Network Performance Management (ANPM), and it is essential to understand the primary requirements for such systems in order to adequately evaluate and select tools and products that will best meet the need. This paper reviews the challenges that ANPM solutions are best fit to address, which qualities and capabilities are of most importance, and how one alternative, Riverbed’s Cascade Solution, stacks up.
Tags : ema, solution, enterprise, network, infrastructure, anpm
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : data security, cloud storage, gateways, requirements, archival, discovery, management, storage
     Riverbed
By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 9 marketing automation platform vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying marketing automation platforms Download the report to learn about these topics and more.
Tags : marketo, mult-channel, native, live event management, content, marketing automation, launchpoint
     Marketo
By: Oracle     Published Date: Feb 27, 2014
Smarter spend management is lacking in most organizations, largely due to the tools being used to manage their procurement processes. Oracle Procurement Cloud combines cloud, best-of-breed functionality, and native connectivity. Deploying Oracle Procurement Cloud can resolve pain points with transactional and strategic procurement.
Tags : oracle, erp, cloud, oracle procurement cloud
     Oracle
By: Oracle     Published Date: Oct 23, 2014
Learn how top marketers improved their Social Media Marketing. See how they generated results like these: • Top gaming company increases social engagement on Twitter by 45% • A top wireless telco boosts Facebook native ad performance 6x • A leading U.S. telco sees a 5.7x lift in social engagement on Twitter
Tags : data management, demystified, audience, targeting, scale, marketing, programs, actionable
     Oracle
By: Thawte     Published Date: Oct 22, 2011
Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
     Thawte
By: Symantec     Published Date: Oct 12, 2012
Download this paper for a better overall understanding of Multi-use SSL Certificates.
Tags : multi-use ssl certificates, secure socket layer, ssl, san, subject alternative name, security
     Symantec
By: Semcasting     Published Date: Feb 19, 2014
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies
     Semcasting
By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security
     Thawte
By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
     Pega
By: Time Warner Cable     Published Date: Apr 11, 2011
This white paper will illustrate how alternative technology from cable MSOs make business continuity solutions more attainable. Specifically, Time Warner Cable Business Class solutions that can contribute to an effective business continuity solution will also be discussed.
Tags : 
     Time Warner Cable
By: Groundwork Open Source     Published Date: Aug 21, 2009
IT teams have long recognized that an enterprise-class IT management system is absolutely essential, especially given the mission-critical nature of most corporate IT networks. In order for robust IT monitoring and management functionality, they had no alternative but to use a proprietary solution. Download this white paper to learn about Open Source alternatives.
Tags : open source, network management, openview, open view, monitoring, open source network, open source networks, groundwork
     Groundwork Open Source
By: IBM     Published Date: Jun 19, 2008
Maintaining data security, performance, availability and recoverability is a growing challenge. The IBM Power platform offers many advantages in performance, scalability and key functional capabilities to support key database serving. In addition, it simplifies virtualization, making it easier to reduce the number of physical servers required. This ITG report shows the advantages of the IBM Power platform as an alternative to commodity Windows servers in mid-sized companies.
Tags : ibm, express seller
     IBM
By: IBM     Published Date: Mar 17, 2009
This Webcast is brought to you by Manufacturing Business Technology, PTC, IBM. It addresses what Companies recognize as the market trends that are driving the need for Product Lifecycle Management (PLM), and how PLM is delivered with alternative business scenarios. Key speakers are Jim Brown, President and analyst of Tech-Clarity Inc, Tom Shoemaker, VP of Solutions Marketing for PTC, and Naseem Rao, Global Solutions Executive for IBM.
Tags : ibm, telelogic, core business values, business continuity, change and configuration management, best practices, plm, market trends
     IBM
By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control
     IDFocus
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication
     Trusted Network Tech
By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : access control, nac, network, identity management, network access control, security, internet security, trusted network tech
     Trusted Network Tech
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics