mobile cloud

Results 76 - 100 of 554Sort Results By: Published Date | Title | Company Name
By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed — securely.
Tags : consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios
     CDW
By: Okta     Published Date: May 09, 2016
Hear how Okta automates employee onboarding and offboarding through deep integration between Workday, Medallia’s human resources information system, and Active Directory.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Okta     Published Date: Jul 19, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: CA Technologies EMEA     Published Date: Oct 19, 2017
Dans un contexte où les entreprises se tournent de plus en plus vers les équipements mobiles, les services Cloud, leurs partenaires et les développeurs tiers, les API sont devenues incontournables. La passerelle d’API de CA Technologies, CA API Gateway, offre une solution unique, capable de prendre en charge les initiatives API internes. Elle offre ainsi aux entreprises la possibilité d’explorer de nouvelles voies novatrices d’exploitation des données tout en répondant aux attentes de leurs clients et en augmentant leur efficacité. CA API Gateway allie la gestion des règles à la mise en œuvre de règles d’exécution pour garantir la centralisation de l’application des règles entre l’entreprise et l’utilisateur final, indépendamment de leur localisation.
Tags : 
     CA Technologies EMEA
By: RingCentral     Published Date: Mar 21, 2014
How RingCentral addresses common concerns about transitioning to a new phone system to deliver an easy setup without hiccups.
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
     RingCentral
By: Wheelhouse     Published Date: Aug 13, 2013
Changes in a number of areas are transforming business telephony. These changes have varying causes: advances in IP communication technology, the explosion of mobile communication, the growth of cloud-based services, and the proliferation of video conferencing, to name a few. The changes have affected small companies in big ways. In particular, they have given SMBs access to communication capabilities formerly reserved for large companies. But they also have growing potential to affect enterprises. Thus the failure to keep on top of them can leave even the biggest companies at risk of falling behind.
Tags : cio, playbook, telphony, video, ip technology
     Wheelhouse
By: Frontrange     Published Date: Mar 13, 2013
Managing IT services has rarely been as challenging as it is today. The solution is to adopting a standards-based strategy that automates IT service management. This white paper examines what’s holding IT back and offers a potential way forward.
Tags : it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
     Frontrange
By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
     Microsoft
By: Cisco     Published Date: May 14, 2015
The shift to mobile and cloud computing is imperative for all company leaders because it facilitates the digitization of the business and advances new ways to enable employees and serve customers.
Tags : cisco, catalyst, networks, byod, mobile computing, wifi, cloud computing
     Cisco
By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
     Group M_IBM Q418
By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The future of work means a new IT balancing act No matter what the work of your organization, today it’s likely done… …As much out of the office as in it …As much on mobile devices as traditional computers …And much more through cloud applications for core business activities and collaboration with customers and partners. The future of work has arrived, and with it comes a complex new balancing act for IT. On one side of the scale are high expectations for how IT can enable digital transformation and innovation in the business. On the other side is more accountability for mitigating risk, even as growing adoption of new technologies means more apps, more devices, and more mobile employees. This balancing act is driven by current challenges and trends in four areas.
Tags : 
     Cisco and NVIDIA Corporation
By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : cloud, best, practices, endpoint, security, data
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : cloud, practices, audit, checklist, endpoint, security
     MobileIron
By: Group M_IBM Q418     Published Date: Sep 10, 2018
The way that people and companies leverage IT is in the process of a revolutionary change. To maintain a competitive edge in the face of an unrelenting pace of innovation, opportunity creation and environmental turmoil, organizations must exploit the provisioning of IT resources to facilitate new ways of doing business. And whether you’re talking about the increase in mobile technologies, the Internet of Things or some other transformative technology, cloud is at the forefront and the heart of this change
Tags : 
     Group M_IBM Q418
By: Mimecast     Published Date: Oct 17, 2013
In this video, Matt Cain, Vice President and lead e-mail analyst at Gartner, outlines some of the options available to CIOs, including running hybrid e-mail environments with tried and tested services delivered from the cloud but the Exchange server remaining onsite. Matt also discusses where Office 365 currently meets the needs of enterprise customers and where third-party services should be considered to augment its functionality in key areas.
Tags : mimecast, cloud email, unified email management, office 365, secure email, mobile workforce, matt cain, migration services
     Mimecast
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: Avaya     Published Date: Jan 23, 2015
This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.
Tags : unified communications, managing uc, uc becoming more powerful and useful
     Avaya
By: Avaya     Published Date: Feb 06, 2015
This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.
Tags : unified communications, managing uc, uc becoming more powerful and useful
     Avaya
By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise
     ClickExpress
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Workday     Published Date: Jun 05, 2017
In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.
Tags : workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology
     Workday
By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources
     Blue Jeans Network
By: New Relic     Published Date: Mar 17, 2015
This white paper will help you understand how you can achieve end-to-end visibility into application performance no matter where your application or parts of your application are running. You’ll learn what to look for when choosing an application performance monitoring solution and we’ll share some lessons learned about monitoring applications in the cloud.
Tags : application performance, apm, monitoring solutions, cloud integration, hybrid clouds, data center, private data security, mobile agility
     New Relic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com