RSS feed Get our RSS feed

News by Topic

bring

Results 376 - 400 of 1098Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : bring your own device, byod, idc survey, it managers, devices on network
     ForeScout
By: Forrester Research     Published Date: Jun 11, 2018
There’s an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends aren’t working together, resulting in appealing websites and apps that don’t quite deliver. We’ve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies’ internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : cio, marketers, business, digital, customers
     Forrester Research
By: Fortinet     Published Date: Nov 14, 2012
How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Tags : fortinet, byod, data loss, market fragmentation, malware, mobile devices, risk, bring your own device
     Fortinet
By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
     Fortinet EMEA
By: Frontier Communications     Published Date: Dec 22, 2016
Many of your peers are using Ethernet to reduce costs, simplify the management of communications and provide flexibility to cope with changes in their business. Now is a great time to take stock of your existing network and see how Ethernet can bring new benefits to your organization.
Tags : 
     Frontier Communications
By: Frontier Communications     Published Date: May 01, 2017
Many of your peers are using Ethernet to reduce costs, simplify the management of communications and provide flexibility to cope with changes in their business. Now is a great time to take stock of your existing network and see how Ethernet can bring new benefits to your organization.
Tags : 
     Frontier Communications
By: Frontier Communications     Published Date: Dec 29, 2017
As a business owner, you’re used to wearing several hats. However, you don’t always have the time or expertise needed for those various roles. So what do you do when you need help but don’t have the resources to bring on a full-time team member? The answer could lie in temporary consulting. If the role you’re struggling with most is in the information technology (IT) department, bring in an IT consultant to solve important technological problems and/or implement new systems. Hiring a temporary IT consultant to work on specific tasks can be more time and cost efficient than hiring a full-time IT employee. Here’s how to find the right IT consultant.
Tags : 
     Frontier Communications
By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
     Frontier Communications
By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : ge healthcare, clinical data, healthcare technology, image management technology, medical imaging, data management
     GE Healthcare
By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging
     GE Healthcare
By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
     GFI
By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server
     GFI Software
By: Gigya     Published Date: Jun 08, 2015
Social login adoption is growing at a rapid clip as businesses come to understand social login as more than just a means to faster registration, and as a key for gaining access to rich, permission-based identity data that drives relevant user experiences. You’ll learn: About the state of social login and latest trends What benefits social login provides for users What value social login can bring to your business Best practices when implementing social login Case studies from leading brands that are using social login
Tags : social login, user experience, faster registration, social login benefits, best practices
     Gigya
By: Global Payments     Published Date: May 02, 2019
China is becoming one of the most important markets for luxury goods in the world. The rise of the Chinese luxury consumer is bringing a world of opportunities to luxury retail giants across the globe. By 2025, it is expected that consumers in China will account for 44% of the $339 billion in luxury goods spending worldwide. This infographic highlights these projected luxury sales increases and identifies the primary drivers and the preferred payment methods for Chinese consumers.
Tags : luxury goods, global payments, unified commerce, retail, wechat pay, alipay, chinese wallets, global commerce
     Global Payments
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices
     GlobalSCAPE
By: Godfrey     Published Date: Oct 24, 2008
Direct marketing has always played a role in B2B marketing programs. But new technologies and audience dynamics are inspiring fresh ways to use strategic, actively-managed and highly-agile database marketing to bring new results. Being successful simply requires a different way of thinking.
Tags : godfrey, b2b direct marketing, management thinking, marketer’s thinking, editor’s thinking, web strategist’s thinking
     Godfrey
By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : byod, bring your own device, security, policy considerations, device, enterprise applications
     Good Technology Corporation
By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : byod, virtualization, enterprise applications, mobile, security, implementation, it implementation
     Good Technology Corporation
By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to tackle the challenges of supporting BYOD programs in this on-demand webcast with Good Technology professional services consultants.
Tags : bring your own device, byod security, byod management, byod solutions, byod policy, byod trend, byod challenges, byod strategy
     Good Technology Corporation
By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
     Good Technology Corporation
By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
     Good Technology Corporation
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics