mobile devices

Results 376 - 400 of 909Sort Results By: Published Date | Title | Company Name
Published By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : 
amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg, martyn davies, mobile and wireless, mobile security, mobile wireless, rasib hassan khan, smartphones
    
Focus
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media, consumer mobile devices, mobile advertising
    
Forrester
Published By: Fortinet     Published Date: Nov 14, 2012
How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Tags : 
fortinet, byod, data loss, market fragmentation, malware, mobile devices, risk, bring your own device, mobile security, mobile device management
    
Fortinet
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
The creation of an immersive virtual setting requires students to understand the immersive visual and audio environment of the world they intend their characters to inhabit. Development of a digital story arc requires an understanding of sequence, causality, and communication of meaning to digital story viewers. An immersive digital story can be created and viewed on mobile devices, tablets, and computers by students as early as elementary school. Virtual Digital Storytelling sits at the convergence point of empathy, social and emotional learning, engagement with community, and learning with emerging technologies. Download today to find out how Fujitsu's suit of Augmented and Virtual Reality tools can help your business.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Most of the public and its public safety professionals live and work in a digital world of mobile devices instant connectivity, and geo-location. This one powerful fact, is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices. Download this whitepaper today to find out how Fujitsu can help your organisation today. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
business solutions, integrated management, public sector
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Most of the public and its public safety professionals live and work in a digital world of mobile devices, instant connectivity, and geo-location. This one powerful fact is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices.1 With the help of advanced technologies, citizens and trusted partners, agencies are: Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: G/O Digital     Published Date: Nov 13, 2014
A lot has changed in the 10 years since Facebook first launched. No longer are social networking sites just a place where people can stay in touch with friends. Now, 30 percent of people use Facebook as their primary source of news. While Facebook is still the number one social network, Twitter, Google Plus, LinkedIn, Instagram, and Pinterest are all growing at steady rates and millions of users are accessing these sites from the palm of their hand with smartphones and other mobile devices. Download this whitepaper to learn how you can leverage social networking to quickly reach users and entire online communities to boost your business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design
    
G/O Digital
Published By: Genesys     Published Date: Feb 27, 2018
Modern contact centers support a variety of digital channels—email, chat, co-browsing, social, video—over multiple digital touchpoints (web or mobile devices). What they lack is the ability to link interactions in a step-by-step journey to provide a personal, contextual experience for each customer. Download this eBook. Learn how you can: • Design a successful digital customer engagement strategy • Provide agents with a 360-degree view of the customer across all digital channels and voice • Deliver omnichannel experiences that are personalized, context-based, and low-effort
Tags : 
digital customer service, contact center, digital channel, ebook
    
Genesys
Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data
    
Gigya
Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security
    
Globalscape
Published By: GlobalSCAPE     Published Date: Jul 16, 2012
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks.
Tags : 
globalscape, mobile devices, mobile security, file sharing, mobile workers, file transfering, cloud sharing, byod
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices, mobile workers, mobile security
    
GlobalSCAPE
Published By: Gomez Marketing     Published Date: Jan 06, 2011
Do you know your mobile customers - really? Without genuine insight, you might be tempted, for example, to offer mobile users the regular website that works well with your Internet customers. But most smart and feature phones cannot support the complex, high-bandwidth Flash and Ajax applications at the heart of your site. Further, your feature and content rich website can pose numerous usability, navigation, or even screen real estate issues on hand-held devices.
Tags : 
gomez, web performance, mobile, mobility, site performance, ecommerce, online shopping, web performance
    
Gomez Marketing
Published By: Gomez Tests     Published Date: Nov 17, 2010
Your customers are visiting your Web and mobile sites on devices ranging from Apple's iPhone to RIM's BlackBerry.
Tags : 
gomez
    
Gomez Tests
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
virtualization, collaboration, enterprise applications, cloud computing, mobility management, mobile collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : 
bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You can’t slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. You’ll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Published By: goTransverse     Published Date: Nov 02, 2016
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing. Download this white paper to learn the eight subscription billing solution providers that matter most and how they stack up.
Tags : 
    
goTransverse
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Resource Library