mobile cloud

Results 176 - 200 of 556Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
If you’re looking to improve sales performance, optimize ecommerce, implement marketing automation, expand social media, deliver better customer service, or utilize accurate Configure-Price-Quote (CPQ) – it’s all Oracle. And, the icing on the cake? All of these solutions are integrated, but modular. We offer a breadth of solutions that you can not only buy individually, but can also easily integrate with existing or additional solutions as your business needs grow. Adapt your customer experience strategy to new technology in Forrester's navigate the future of CRM in 2017 Report.
Tags : mobile, artificial intelligence, chatbots, internet of things, integrated suite, cloud solutions
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Symantec     Published Date: Jul 11, 2017
This white paper explores the challenges associated with protecting data in today’s enterprise and starts to detail how a modern data loss prevention (DLP) solution, delivered as part of a cloud-based web security gateway, can provide continuous monitoring and protection of sensitive data on mobile devices, on-premises and in the cloud.
Tags : data protection, security, encryption, cloud, web security
     Symantec
By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : cloud, security, data protection, data loss, information security
     Symantec
By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access technologies were created twenty-years ago, before businesses were distributed, mobile, and users of cloud. View this slideshare to learn 3 reasons why now is the time for a new remote access model.
Tags : 
     Akamai Technologies
By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : cyber security, global threat intelligence, malware prevention, cyber threat, protection
     IBM
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® per nuove, infinite possibilità.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® pour de nouvelles possibilités.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside®. Neue Möglichkeiten Outside.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
By: Riverbed     Published Date: Jun 05, 2017
This IDC Technology Spotlight looks at the role of Riverbed in accelerating digital transformation by addressing the new requirements for a cloud-ready enterprise.
Tags : digital transformation, cloud, cloud-ready, iot, internet of things, analytic, mobile, cloud applications
     Riverbed
By: Workday     Published Date: Jun 05, 2017
In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.
Tags : workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology, finance technology
     Workday
By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
     Palo Alto Networks
By: Oracle HCM Cloud     Published Date: May 25, 2017
Ongoing shifts in labor trends have made people strategy a top priority for business success. This Brandon Hall Group brief reveals that disjointed legacy HR systems stitched together and packaged as “cloud” don’t meet the needs of today’s mobile workforce. Are you leveraging a truly complete HCM cloud suite to meet modern business needs?
Tags : 
     Oracle HCM Cloud
By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
     VMware
By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
     VMware
By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
     VMware
By: Oracle Hospitality - S&E     Published Date: May 09, 2017
The Oracle Hospitality Sports and Entertainment Simphony platform is a complete technology solution for venue management. With mobile and cloud solutions, ensure your venue is able to maximize revenues, while delivering a modern fan experience.
Tags : 
     Oracle Hospitality - S&E
By: ASG Technologies     Published Date: Apr 25, 2017
In today’s business model, organizations must provide support and flexibility in addressing the needs of a growing mobile workforce, and interactions with external partners, suppliers, and clients. In short, today’s business model must look beyond corporate walls and extend their business processes and access to business information in an effective, and secure manner regardless of device type. In this way, cloud applications can be leveraged to enhance and extend business processes beyond their corporate walls and support the increasing use of mobile devices. This paper presents the challenges and benefits of implementing an integrated cloud solution that provides the flexibility, agility, and security business organizations need to increase operational efficiency, and responsiveness.
Tags : 
     ASG Technologies
By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : (delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
     IBM
By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     CA Technologies
By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, app security
     MobileIron
By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
     MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com