mobile users

Results 151 - 175 of 329Sort Results By: Published Date | Title | Company Name
Published By: Hitachi ID     Published Date: Jun 09, 2011
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
Tags : 
password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords, technology
    
Hitachi ID
Published By: HP and Intel ®     Published Date: May 27, 2014
This checklist is designed to avoid getting onto a straight and narrow path that provides little flexibility to branch out and merge with other IT strategies and visions.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
This checklist is designed to avoid getting onto a straight and narrow path that provides little flexibility to branch out and merge with other IT strategies and visions.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance
    
Commvault
Published By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : 
copiatech, wireless, wireless security
    
CopiaTECH
Published By: Motorola     Published Date: Feb 06, 2008
By empowering mobile users with interactive access to mission-critical systems, Good Mobile Intranet increases the ROI of your existing IT investments. Read this white paper to learn more about how to deliver mobile solutions that provide an intuitive user experience.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications
    
Motorola
Published By: Urban Airship     Published Date: Apr 17, 2014
In our latest Good Push Index data study (examining more than 2,400 apps and 500 million push notifications), we reveal how push messaging influences mobile app users’ behavior, measuring both engagement and retention over a six-month period.
Tags : 
urban airship, gpi, good push index, mobile marketing, mobile, mobile app, push notifications, customer engagement, smartphone, app engagement, mobile strategy
    
Urban Airship
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document explique comment éliminer la complexité et les coûts des réseaux sans fil traditionnels et créer un réseau prêt pour la mobilité.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks, mobility network
    
Aerohive
Published By: Marketo     Published Date: Oct 17, 2016
A great email helps you engage your customer and deliver your message, which can make a difference between a click-through and a direct route to your website or losing a customer’s interest and being sent to the spam folder. As consumers become increasingly savvy about all types of communications—from mobile to social to email—email, for example think about Gmail’s tabbed inbox where users can filter and organize their inboxes. It is becoming even more difficult to stay front and center. Download now to learn more!
Tags : 
email marketing, email blasts. electronic marketing
    
Marketo
Published By: IBM     Published Date: Jun 15, 2009
Read this astounding case study to see how migrating to IBM Lotus software with a broadly functional messaging platform increased the efficiency and support of mobile users for the Kentucky Baptist Convention. Then you'll learn how your own business can improve communications, drive down costs and eliminate the need for additional Web software.
Tags : 
kentucky baptist convention, case study, nonprofit, lotus software, messaging platform, ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities
    
IBM
Published By: Keynote     Published Date: Nov 13, 2013
Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices, test mobile phones, iphone app testing, mobile site testing, "smartphone testing", mobile website testing, mobile software testing, test mobile applications, "automated mobile testing", application testing software, mobile automation, mobile testing automation, mobile app testing
    
Keynote
Published By: TIBCO     Published Date: Aug 18, 2014
Today, the open API is one of the most powerful sources of competitive advantage. It comes down to the potential of your data and services. Download this new eBook to learn how a well thought-out API strategy can help you compete and grow in new ways.
Tags : 
tibco, api, byod, end user intelligence, business intelligence, byod, mobile device users, business strategy
    
TIBCO
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: Reed     Published Date: Aug 03, 2013
The proliferation of mobile devices has created an insatiable appetite among users for applications that give them instant access to the content they want in the form they want it whenever and wherever desired. So the sparring between HTML5 and Native centers on the best means of developing engaging apps to meet this growing demand.
Tags : 
    
Reed
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: IBM     Published Date: Apr 20, 2017
In today’s highly digital world, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses in order to deliver an optimal user experience. The IBM MaaS360 suite allows for a robust app development platform where you can increase portability and interoperability to enable and support every mobile user in your organization. Download this e-book to see how you can create the best mobile environment for your users and employees. All of the Enterprise Mobile Management tools and services needed to deliver the optimal user experience to every user, wherever they are, whatever app they are using, and whenever they need resources, are well-integrated into the MaaS360 suite from IBM.
Tags : 
enterprise management, mobile management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: HP and Intel ®     Published Date: May 27, 2014
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : 
mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery, mobile acceleration, mobile cdn, cotendo mobile, mobile internet performance, mobile rtt, mobile round trip time, mobile spdy, cotendo, white paper
    
Cotendo
Published By: NetApp     Published Date: Sep 30, 2013
"As the rapid rise in the number of mobile devices and users creates an explosion in data and virtual machine instances, datacenter transformation becomes imperative for many enterprises. It is essential enterprises move to consolidate resources and cut both capital and operating costs while still providing support for distributed applications. This brief white paper delves into a Q&A with Eric Sheppard, research director of IDC’s Storage Software program, on integrated systems and whether you should buy compute, network, and storage resources together. Read on as you will discover: What integrated systems are, and its benefits The differences between an integrated platform and integrated infrastructure How datacenters are leveraging these new systems today And more" NetApp Privacy Policy
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations
    
NetApp
Published By: OpenDNS     Published Date: Jan 07, 2013
This whitepaper examines how the dramatic shift toward mobility has impacted IT's ability to effectively secure users, wherever they choose to work. Inside, you'll find advice for securing your users that's both practical and easy to implement.
Tags : 
security, network security, cloud, mobile, nomadic users
    
OpenDNS
Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management
    
SAP
Published By: SnowFlake     Published Date: Jul 08, 2016
Jana provides free, unrestricted internet access to more than 30 million smartphone users in emerging markets. With their mCent Android app, Jana shifts the cost of mobile data to brands via sponsored content. When users engage with content in mCent, they earn free mobile data that can be used anywhere on the internet. Jana product managers use data to constantly analyze how well each of the features in mCent performs, to determine which features should be turned on for everyone, and which features should be turned off.
Tags : 
snowflake, data, technology], mcent, best practices, mobile computing, smartphone
    
SnowFlake
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library