mobile cloud

Results 51 - 75 of 556Sort Results By: Published Date | Title | Company Name
By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : cognizant, banking, digital
     Cognizant
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Security in a mobile, cloud- enabled World! The way we work has changed, Security must also change. Built to solve the security challenges of today's mobile, cloud- enabled enterprise, a new category of products is emerging- the secure interest gateway. Download this Infographic today to find out more!
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
     Intel
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management. As we receive inquiry on this area increasingly, it makes sense to assess this market.
Tags : 
     CA Technologies EMEA
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 10, 2018
The way that people and companies leverage IT is in the process of a revolutionary change. To maintain a competitive edge in the face of an unrelenting pace of innovation, opportunity creation and environmental turmoil, organizations must exploit the provisioning of IT resources to facilitate new ways of doing business. And whether you’re talking about the increase in mobile technologies, the Internet of Things or some other transformative technology, cloud is at the forefront and the heart of this change
Tags : 
     Group M_IBM Q418
By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
     Intel
By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : criminal, justice, information, services, cjis, compliance
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : cloud, practices, audit, checklist, endpoint, security
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : security, enterprise, cloud
     MobileIron
By: TIBCO Software     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
     TIBCO Software
By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
By: IBM     Published Date: Jul 31, 2018
Manage identity and access across the full range of on-premises, cloud and mobile applications with IBM Cloud Identity.
Tags : 
     IBM
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Most companies would love to move enterprise applications to the public cloud and cut the costs, complexities, and limitations of current infrastructure. Major public cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud have done well in enabling web, mobile, and content applications in the cloud. These are cloud-native applications designed to use cloud “object” storage, and object storage is very popular for use cases such as backup and disaster recovery. However, enterprise applications typically require “block” storage. Although native cloud block storage exists, it has several shortcomings, particularly around reliability, durability, and lack of data mobility. So, enterprise applications have largely stayed on-premises or in private clouds. Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and tradeoffs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure w
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
IT services such as mobile devices, smart applications and cloud-based services are transforming the way we live, work and communicate. Global technology services and businesses are embracing digital transformation, introducing Intelligent Spaces to unleash worker productivity and accelerate the pace of business. The workplace plays a critical role in an organization’s digital transformation. Forward-looking organizations recognize that you can’t build a digital business without building a digital workplace.
Tags : 
     Hewlett Packard Enterprise
By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
     IBM
By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     IBM
By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
     Box
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com