mobile device

Results 326 - 350 of 1287Sort Results By: Published Date | Title | Company Name
Published By: Procore     Published Date: Jul 08, 2019
Download the ebook to learn how construction technology is making UK & Ireland contractors more resilient and competitive. And follow the 7-step practical guide for kick-starting a digital construction strategy in your business, regardless of its size and complexity. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Centrix Software     Published Date: Mar 19, 2014
This paper takes a look at the challenges of end-user estate management in the world of cloud, virtualization, on-premise, mobile devices and desktops
Tags : 
workspace, desktop, end user management, cloud, virtualization, applications
    
Centrix Software
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Aerohive     Published Date: May 13, 2015
This case study reveals the WLAN Network challenges and the benefits of using Aerohive Wi-Fi Solution.
Tags : 
wlan, wlan network, wlan network challenges, wi-fi, aerohive solutions, mobility, mobile devices, mobile
    
Aerohive
Published By: Aerohive     Published Date: May 13, 2015
This case study explores the new challenges of WLAN Network and reveals the advantages of using Aerohive Wi-Fi solution.
Tags : 
wi-fi, wi-fi solutions, aerohive, wlan, wlan network, wlan network challenges, wi-fi, aerohive solutions
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
    
Aerohive
Published By: Microsoft     Published Date: Oct 24, 2016
This report explores the four elements of an enterprise mobility strategy and how to address the challenges that your enterprise may face in a mobile environment.
Tags : 
enterprise mobility management, mobility, mobile devices, bring your own device
    
Microsoft
Published By: Microsoft     Published Date: Oct 24, 2016
This Technology Spotlight examines the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps. It also explores the role of Microsoft's Enterprise Mobility Suite (EMS) in the strategically important EMM market.
Tags : 
mobility, enterprise mobility management, software as a service, cloud, mobile security
    
Microsoft
Published By: Microsoft     Published Date: Oct 24, 2016
Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats - today.
Tags : 
mobile security, enterprise mobility management, mobility, mobile devices, bring your own device
    
Microsoft
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Cisco     Published Date: Apr 20, 2016
Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment. This is now reality for government agencies, thanks to Cisco WebEx® Web Conferencing, a FedRAMP-compliant service. As a FedRAMP-compliant solution provided by the market leader in web and video conferencing, Cisco WebEx Web Conferencing lets you: • Easily meet face to face with meeting participants from other locations • See and hear the same information at the same time with attendees • Collaborate and increase productivity without the need for travel • Make meetings more engaging with high-definition (HD) video, audio, and content sharing
Tags : 
cisco webex, web conferencing, productivity, connectivity, government agencies, fedramp, video conferencing
    
Cisco
Published By: IBM     Published Date: Aug 08, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: Avaya     Published Date: Dec 18, 2013
It is a business maxim that the more a company knows about its customers and what they want, the better its chances of providing them a positive, fulfilling experience. With today’s ubiquitous, convenient communications methods, particularly the use of mobile devices and networks, opportunities for rich customer interactions are flourishing. Whether their interest is pricing, store locations or product support, people increasingly expect information to be available wherever, whenever and however they want it.
Tags : 
avaya, cem, customer experience management, contact center, mobile, mobile devices, customer interactions
    
Avaya
Published By: Citrix Systems     Published Date: Sep 17, 2015
Embracing mobile devices, thin clients, new app delivery systems, and BYOD all represent a huge challenge to IT. The incredible amount of flexibility, productivity, and employee satisfaction that can be gleaned from the support of such initiatives is massive. However, this shift comes at a high price in terms of increased infrastructure cost and the increased complexity of managing it all.
Tags : 
mobile, thin clients, app delivery, byod, employee productivity
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
Taking Windows applications and desktops mobile has many advantages, but the process of identifying a single solution is complex. Learn how Citrix XenApp solves this complex problem.
Tags : 
windows, citrix xenapp, mobile, it solutions
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : 
cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
    
ZScaler
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Published By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.