mobile solutions

Results 301 - 325 of 332Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 19, 2012
Three trends have altered the Web content management market since 2011: social media, mobile computing and WCM used in more comprehensive solutions toward online channel optimization. Read on to learn more about WCM and the best in class solutions.
Tags : 
wcm, adobe, web content management, java, .net, social media, customer experience, online channel
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
This white paper discusses what's needed to ensure that mobile workers can talk across space and time boundaries and share information to speed processes.
Tags : 
ucc, mobile workforce, ucc solutions
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Multitasking, Adobe® Flash®, and video capabilities are just a few features of the BlackBerry PlayBook tablet that are helping to enable McCain's sales team to work and communicate more effectively while on the road.
Tags : 
blackberry, tablet, application development, apps, mobile workforce, mobile workforce solutions
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Many businesses are tasked with the challenge of getting the most current collateral to their mobile workforce, efficiently and securely. That's why Box Inc. developed Box for the BlackBerry PlayBook tablet (Box App).
Tags : 
file management, blackberry, tablet, cloud computing, mobile computing, application development, cloud based content management system, cms, mobile workforce solutions, mobile computing
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Get future ready with BlackBerry Enterprise Server v5. Join a free webcast to understand how upgrading to BlackBerry Enterprise Server v5 will get your organization ready for the next generation in mobile device management: BlackBerry Mobile Fusion.
Tags : 
blackberry enterprise server, mobile device management, mdm, mobile computing, mobile solutions
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
Blackberry
Published By: Blackberry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
Blackberry
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees
    
HP and Intel ®
Published By: IBM     Published Date: Jan 09, 2014
Today, large organizations are being buffeted by a host of changes, many of them unexpected or unfamiliar. Business information is virtually exploding in size, kind and locale, taxing the abilities of even the most progressive enterprises to keep up. Mobile technologies and business analytics that were once exclusively used by employees with specialized needs and skills are now common across the entire workforce. As a result of all this, IT is bending under the strain of developing and delivering necessary new services while at the same time maintaining core service quality. This report will consider these issues, as well as IBM’s position in and efforts around developing next generation enterprise systems solutions, including its System z mainframes, POWER7+ processor-based Power Systems servers and System Storage offerings focused on those areas and use cases.
Tags : 
enterprise systems, system performance, power7+, power systems servers, system storage, it infrastructure, analytics solutions, business analytics, business processes, charles king, pund-it, inc., ibm
    
IBM
Published By: CradlePoint     Published Date: Sep 04, 2014
Whether your businesses are connected to the Internet via T1/T3, DSL or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is a loss in connectivity via your wired line. With CradlePoint routers as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment. Please download the whitepaper to learn more!
Tags : 
cradlepoint, business continuity, dsl, internet service, t1 or t3 line, distributed enterprises
    
CradlePoint
Published By: IBM     Published Date: Apr 07, 2015
IBM’s Mobile Smarter Process offering combines our award winning Mobile, Process and Cloud solutions to allow you to capitalize on mobile’s unique capabilities by redefining your organization around the mobile moment. Join our experts as they present an overview of Mobile Smarter Process and corresponding demo on Cloud to learn how your organization can get the most out of your mobile initiative through faster time to value. And then you too can make the mobile promise come true.
Tags : 
ibm, mobile, cloud, mobile smarter process, time to value
    
IBM
Published By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC
Published By: IBM     Published Date: Mar 31, 2016
"The market buzz around APIs has distorted executive's thought processes about how to make money from APIs. Our guest speaker, Forrester analyst Randy Heffner, will tell the real truth about how to drive value from APIs. Who Should Read/View This webcast: business audience Attend to also learn how to: Provide business users with real-time information for more informed decision making Leverage the latest cloud, mobile, and analytics enhancements in IIB v10 Use the IIB Healthcare Pack to accelerate development and deployment of integration solutions Who Should Attend this Webcast: business audience"
Tags : 
ibm, api, integration, application program interface, middleware
    
IBM
Published By: Genesys     Published Date: Dec 20, 2018
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: • Why force-fitting more channels into an aging infrastructure is not the right approach • How to create a future-ready customer experience • How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
    
Microsoft
Published By: CBRE     Published Date: Aug 02, 2017
MobileIron Access Overview
Tags : 
mobileiron, access, software solutions
    
CBRE
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: Lookout     Published Date: Dec 13, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
mobile security, mobile device management, identity management, network attacks, malicious apps
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used. Gradually add MTD systems to the organization to mitigate attacks, emphasizing integration, and avoid long-term contracts.
Tags : 
mobile, threat, defense, lookout, mtd
    
Lookout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.