mobile environment

Results 1 - 25 of 161Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : mobility, mobile computing, best practices, data security
     Absolute Software
By: Act-On     Published Date: Jul 08, 2015
In this eBook, you’ll learn the complexities behind mobile marketing in the B2B environment and get nine action steps you can take to generate leads with mobile.
Tags : mobile marketing, marketing tech, lead generation, guide
     Act-On
By: Adobe     Published Date: Nov 25, 2013
Without document classification in play, it's impossible to know what to protect. The mobile ecosystem makes workers infinitely more productive, which is one reason that it won’t go away. This white paper explores the question: How can IT govern and protect content in such ad hoc and semi-structured environments? Please download whitepaper to learn more.
Tags : document, document classification, document security, mobile, mobile workforce, cloud-based, mobile, mobile ecosystem
     Adobe
By: Aerohive     Published Date: Oct 15, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, networking
     Aerohive
By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: May 13, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: May 13, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: May 14, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aerohive     Published Date: May 14, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Aternity     Published Date: Jul 20, 2012
This essential resource highlights a groundbreaking end user experience (EUE) management platform that can help organizations enable unparalleled application performance and user experience across physical, virtual and mobile environments. Discover how the extensive monitoring, reporting and analysis tools included in this platform are helping organizations overcome common mobile computing challenges.
Tags : technology, user, experience, management, enterprise, experience management, mobile
     Aternity
By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : web security, mobile threats, security, cloud, application, technology, solution, networking
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : web security, mobile, workforce, bluecoat, security
     Blue Coat Systems
By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management
     BlueCat
By: Brainshark     Published Date: Oct 16, 2013
With the proliferation of the iPad and other tablets and mobile devices among sales and account managers, a new generation of enabling technologies and best practices has offered the opportunity to get more out of the out-of-office experience. This research brief examines the use of video tools by sales professionals within best-in-class companies, specially within a mobile environment.
Tags : sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing
     Brainshark
By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
     Brainshark
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     CA Technologies
By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : mobile, security, strategy, application, enterprise, network, data
     CDW
By: CDW     Published Date: Sep 21, 2015
Years of IT infrastructure advancements have helped to drive out vast amounts of costs within the datacenter. Technologies like server and storage virtualization, data deduplication, and flash-based storage systems (to name just a few) have contributed to improvements of utilization rates, performance, and resiliency for most organizations. Unfortunately, organizations still struggle with deeply rooted operational inefficiencies related to IT departments with silos of technology and expertise that lead to higher complexity, limited scalability, and suboptimal levels of agility. The recent tectonic shifts caused by the rise of 3rd Platform applications that focus on social, mobile, cloud, and big data environments have amplified the pains associated with these structural inefficiencies.
Tags : quantify, infrastructure, performance, resiliency, data deduplication, datacenter, virtualization, it management
     CDW
By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : cisco, malware protection, security, nss, malware protection solution, advanced malware protection, amp, endpoints
     Cisco
By: Cisco     Published Date: Oct 14, 2015
Mobile technologies are having a dramatic effect on the way we live, work, learn, and play. While organizations recognize that the impact of mobility could be as great as that of the web, many are struggling with what exactly to do about it. IT leaders have the opportunity to direct this transformation. Read more to learn how.
Tags : cisco, mobility solutions, mobility, mobile technologies, mobile work environment, networking, it management, enterprise applications
     Cisco
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com