phone

Results 951 - 975 of 979Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: XO Communications     Published Date: Apr 14, 2015
Enterprise communications is at a critical juncture. Employees require the very best mobility and collaboration tools while IT struggles with tight budgets and lean staffing. Read this paper to learn about these looming challenges and how hosted PBX with Unified Communications can help you address these issues, paving the way for better enterprise communications.
Tags : 
    
XO Communications
Published By: MobileIron     Published Date: Apr 28, 2016
Ein vereinheitlichter Satz MDM-APIs erlaubt es der IT, die Geräteverwaltung und Gerätesicherheit auf einer EMM-Konsole für Tablets, Desktops, Smartphones und integrierte Geräte zu zentralisieren.
Tags : 
    
MobileIron
Published By: InsideUpbg     Published Date: May 21, 2015
Choosing a business phone system is one of the most important purchasing decisions you can make for your company. The latest small business phone systems boast dozens of user-friendly features that can give your company the same functionality that large enterprises enjoy. Download our guide to learn important facts about business phone systems, including key benefits and tips for assessing the needs of your business.
Tags : 
    
InsideUpbg
Published By: FICO     Published Date: Dec 04, 2017
As consumers, we’re all having more experiences that seem almost magical: You’re in a mall when suddenly your smartphone beeps. It’s an offer for 20% off a pair of shoes you’ve been looking at online — from the store you just walked past! As business people, we know it’s not magic, but rather analytics powering these outstanding customer experiences. Analytics have evolved to the point where they answer an expanding range of useful questions. But understanding the different types of analytics – descriptive, diagnostic, predictive and prescriptive - and how to use them in your business can be challenging. Download the eBook to learn about the least understood – yet most powerful – tool in the analytic arsenal. Prescriptive analytics enable you to estimate and compare the likely outcomes of any number of actions, and choose the very best action to advance business objectives. Getting there isn’t as difficult as you think. Start your journey. Download the eBook today.
Tags : 
profits, analytics, credit, social, media, services, customer, consumers
    
FICO
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Windows-Anwendungen und -Desktops gehören zur Kernausstattung moderner Unternehmen, auch wenn mobile Plattformen, Smartphones und Tablets heute überall zu finden sind. Im Unterschied zu den Architekuren der mobilen Infrastruktur hat sich die Desktop- Infrastruktur seit vielen Jahren kaum weiterentwickelt. Aber jetzt ist der Zeitpunkt für die Desktop- Transformation gekommen.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Les postes de travail et applications Windows sont des éléments vitaux pour l’entreprise encore aujourd’hui, malgré l’adoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail n’ont pas su évoluer au fil des ans. L’heure de la transformation du poste de travail a sonné.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Published By: Polycom     Published Date: Nov 12, 2015
Watch this series to learn about the latest trends in collaborative workspaces from senior analysts, ways to improve your conferencing capabilities through new phones and integrating skype for business, and Realpresence Trio: the smart hub for collaboration.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Feb 16, 2017
"Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you. "
Tags : 
polycom, business technology, skype, byod
    
Polycom
Published By: Polycom     Published Date: Feb 16, 2017
"Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft."
Tags : 
polycom, business technology, roi, voice solutions, office 365, cloud pbx
    
Polycom
Published By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
    
U.S. Cellular
Published By: Jamf     Published Date: Nov 05, 2018
There are no signs of Apple device growth slowing down in the enterprise. In fact, 3 out of 4 employees now choose an iPhone or iPad for their mobile device. Our guideon the basics of device management will help you enhance iPhone, iPad and iOS management skills by providing you with: • An introduction to iPhone, iPad and iOS management • Explanation of Apple services and programs available • Outline of lifecycle management stages • Insight for infrastructure planning • Overview of the industry-leading Apple management solution
Tags : 
    
Jamf
Published By: Citrix ShareFile     Published Date: Apr 12, 2017
Your directors may not have approved it, your IT department may not be ready for it, but your employees are already using their smartphones and tablets for work tasks. Don’t fight the change, embrace it: a mobile workforce can pay huge dividends for productivity and employee satisfaction. Download this e-Book to learn: • How giving your employees the choice to work from home can save $11,000 per year • What tool you can give your employees to boost creative innovation by 250% • Why organizations embracing mobility claim 320 hours more work per employee ?
Tags : 
mobile workforce, employee satisfaction, increased productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
iCruise.com, one of the largest sellers of cruises in the US, needed a total communications solution with both hosted phone service and a cloud contact center. Only 8x8 was able to deliver a complete and integrated approach to customer service
Tags : 
customer service, 8x8, integration, icruise.com, communications
    
8x8 Inc.
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : 
cyber security, lookout, smartphone, tablet, mobile
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : 
enterprise, mobile, security, lookout, revolutionary
    
Lookout
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Pure Storage     Published Date: Oct 09, 2017
Digital technology is so intrinsic to our personal lives that we barely think about the fitness trackers and smartphones that are as much a part of us as the clothing we wear. For organizations, the shift to digital is more disruptive and the stakes far higher. Digital transformation has been high on the executive agenda for a few years and, for many, harnessing data has become a significant force for value and revenue creation.
Tags : 
workload, data management, digital transformation, cloud, organization optimization, pure storage
    
Pure Storage
Published By: HotSchedules     Published Date: Sep 11, 2018
When it comes to scheduling employees, restaurants have a lot of choices. There’s paper, sticky notes, emails and spreadsheets. But as managing labor gets more complex and employees turn more and more to their phones, these old-school methods just aren’t getting the job done. This puts most restaurant operators in one or two categories: either they’ve already adopted an online scheduling software to manage their workforce, or they know they need to make the switch. This ebook will show you how easy it is to use employee scheduling software and how much time it can save everyone in your organization.
Tags : 
    
HotSchedules
Published By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And it’s not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobility’s promise.
Tags : 
hyland, offline access, mobility, remote access, mobile access, business applications
    
OnBase by Hyland
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search Resource Library