mobi

Results 401 - 425 of 4987Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Nov 27, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on digital transformation grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: Why government IT teams must move beyond point-to-point integration How API-led connectivity supports microservices adoption in government How government can use MuleSoft’s FedRAMP In Process integration platform to rapidly develop APIs and microservices
Tags : 
     MuleSoft
By: Ericom     Published Date: Nov 05, 2012
The accelerating BYOD trend and the need to reduce IT overhead, organizations need to empower users with secure browser-based access to Windows Applications and desktops from any device. Learn how AccessNow empowers mobility and security.
Tags : ericom, html5, rdp, accessnowt, windows apps, desktops, mobility
     Ericom
By: CA Technologies EMEA     Published Date: Oct 19, 2017
En 2007, l’iPhone™ d’Apple™ révolutionne le monde de l’informatique, mais c’est bien l’ouverture de l’App Store™ en 2008 qui marque l’avènement d’une nouvelle ère dans le commerce mobile. L’App Store™, mais aussi Google Play™, permettent alors aux entreprises de fournir des informations et des services via un canal de consommation nouveau, intime et extraordinaire.
Tags : 
     CA Technologies EMEA
By: DellEMC and Intel®     Published Date: Jan 17, 2017
It’s a new era in IT. The end-­user workforce is mobile, social, and putting huge strains on your Virtual Desktop Infrastructure (VDI). It’s time for a new model, one that liberates you from costly infrastructure maintenance and delivers the service and availability end-­users demand. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, et Xeon Inside sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: CDW     Published Date: Apr 22, 2015
Today’s increasingly mobile workforce demands ubiquitous, fast wireless access to meet the changing needs of the modern organization. The Wi-Fi networks that used to support this access often grew organically and were not engineered to support the widespread, high bandwidth needs of users.
Tags : infrastructure, wireless, bandwidth, engineering, mobile, workforce, demands, it management
     CDW
By: Cisco     Published Date: Feb 13, 2015
Get your IDC report on how enterprises are adopting both private and hybrid cloud computing models for business. Learn about their challenges, and how Cisco Intercloud Fabric helps to address them.
Tags : hybrid cloud, cloud management, mobility, virtualization, data analytics, internet of things, it department, cloud computing
     Cisco
By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : continuous verification, product development, product engineering, mobile, prototyping, software development, it management, enterprise applications
     IBM
By: IBM     Published Date: Jan 23, 2013
In our hyperconnected world, employees expect to work from anywhere … at any time … with any device. Each of these new access points, however, increases the IT security perimeter.
Tags : byod, mobile, remote access, productivity
     IBM
By: IBM     Published Date: Oct 10, 2013
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : workplace environment, enterprise, flexible workplace, ibm, enhance productivity, workplace environment, forward thinkers, achieve success
     IBM
By: DellEMC and Intel®     Published Date: Jan 17, 2017
It’s a new era in IT. The end-­user workforce is mobile, social, and putting huge strains on your Virtual Desktop Infrastructure (VDI). It’s time for a new model, one that liberates you from costly infrastructure maintenance and delivers the service and availability end-­users demand. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
     DellEMC and  Intel®
By: Acronis EMEA     Published Date: May 18, 2015
Download this datasheet to discover the main benefits of Acronis Access Advanced.
Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
     Acronis EMEA
By: Adobe     Published Date: Apr 27, 2016
Discover how to measure and optimize your apps so they keep customers coming back for more.
Tags : adobe, mobile, app, marketing, marketing trends
     Adobe
By: Yammer     Published Date: May 23, 2012
The enterprise social software market is exploding thanks to converging trends of consumerization, cloud, and mobile. In this must-read report, "The Forrester Wave: Activities Streams, Q2 2012", Forrester Research Inc. evaluated five social software vendors with core strengths in the stream based on the overall strength of vendors' current offerings, a clear product strategy, and vendor market presence. In a detailed look at the space, Forrester named Yammer as a leader.
Tags : yammer, enterprise social, integration, cloud, adoption
     Yammer
By: Lyft     Published Date: May 06, 2016
Business travelers in the U.S. will take close to 500 million trips in 2016. That means, every day, nearly 40,000 people are booking ground transportation¹. Meanwhile, a stream of devices and applications are emerging to help travelers get to their destinations in more efficient, safe, and affordable ways. This constantly-changing landscape can leave your team lost, fighting other business travelers for space and trying to keep up with the best apps. And lost is the last place your team should be, especially when they’re traveling for work.
Tags : best practices, business optimization, business management, mobile, transportation
     Lyft
By: IBM MaaS360     Published Date: Feb 06, 2015
Download the Essential Capabilities for Secure Mobility for a high-level look at the over 300 guidelines in the DISA’s Mobile Device Management (MDM) Server Security Requirements Guide, and strategies to manage this ever expanding list.
Tags : nist, dod requirements, secure mobility, mdm, data communication, device authentication, it management, data management
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : mobile device security, byod, application security, data security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
     IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : ibm, nist, dod, mobile device management, data security, server security, networking, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management.
Tags : ibm, nist, dod, mobile, mobile device management, mdm
     IBM MaaS360
By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
     IBM
By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : byod, okta, mobility, safety, dad, mobility management
     Okta
By: IBM     Published Date: Mar 04, 2014
This white paper discusses the key market trends and challenges facing organizations as they seek to deploy mobile enterprise solutions and examines the growing requirements of these firms. It also delivers an overview of how enterprises can address the challenges in terms of repackaging and optimizing applications to better operate in a converged, dynamic mobile world.
Tags : ibm, mobile, mobile enterprise, market trends, deployment, mobile enterprise solutions, applications, application performance
     IBM
By: Adobe     Published Date: Aug 11, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, it management
     Adobe
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com