Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

cloud mobility

Results 126 - 150 of 231Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 18, 2015
To stay relevant and competitive in business today, companies must respond and interact with their customers in ways that were simply inconceivable a decade ago. Mobile, social and cloud are enabling businesses to better engage with customers, but these technologies put new pressures on businesses.
Tags : 
cloud applications, mobility, application integration, customer feedback, software defined environments, automate manual process, improving productivity, collaboration
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization, infrastructure, data center design and management
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure, infrastructure, data center
    
IBM
Published By: IBM     Published Date: Apr 26, 2016
Restoring connections: How telecommunications providers can reboot the customer experience IBM has more than 22,000 experts working in the Telecommunications industry, delivering solutions to more than 200 major communications service providers globally. IBM’s telecommunications capabilities are backed by a global network of telecom solution labs, research labs and innovation centers to support its offerings in the area of analytics, cloud, mobility, network optimization, digital transformation and global integration. IBM continues to invest significantly in key acquisitions to add expertise and capabilities that enable its clients in the telecommunications space.
Tags : 
ibm, ibm institute for business values, telecommunications, customer experience, communications service providers, csp, customer relationship, telecom
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: May 22, 2017
Learn how cloud has become a fundamental enabler of banking innovation.
Tags : 
cloud computing, cloud mobility, cloud security, banking, digital signature, transaction security, financal security
    
IBM
Published By: JBoss Developer     Published Date: Feb 05, 2016
Perhaps the biggest transformation in enterprise IT since the public cloud emerged is the move toward “mobile-first” application development. As mobility continues to become the new enterprise standard, developers are looking for frameworks that provide the tools they need to create innovative mobile applications without sacrificing their existing investments. While there are proven, enterprise-ready frameworks and platforms for developing and deploying traditional desktop applications, the mobile application development landscape is still evolving. Mobile Backend as a Service (MBaaS) attempts to fill the gap between traditional application platforms and mobile applications. It is the new middleware, exposing APIs and functions that enable developers to rapidly build new mobile apps and mobile-enable legacy enterprise applications.
Tags : 
jboss, red hat, gigaom, enterprise, mbaas platforms, cloud, mobile applications, it management, enterprise applications, cloud computing
    
JBoss Developer
Published By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization, data, traffic, analytics, networking, security, it management, wireless
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Business and IT leaders are looking to virtualization and cloud computing to deliver unprecedented agility for supporting a wide range of objectives, including cost management, increased mobility, higher application availability, and greater responsiveness to customer-related opportunities.
Tags : 
network, management, mobility, application, network management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
Cloud, mobility, and big data are driving business change and IT transformation
Tags : 
architecture, big data, cloud, mobility, management, applications
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 22, 2017
Hybrid cloud is your IT platform of the present. Juniper Unite Cloud helps you win the race to the hybrid cloud because it offers the flexibility of hybrid cloud and hybrid operations models while effectively confronting and addressing the overabundance of variables in hybrid IT technologies. Juniper’s product portfolio offers the ultimate flexibility, so that you can seamlessly integrate cloud stacks and unify policy in and across today’s and tomorrow’s private and public clouds. Contact your Juniper Networks representative to learn more about this hybrid cloud solution.
Tags : 
cloud computing, cloud mobility, cloud security, esignature, digital signature, transaction security, financal security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution, security, it management, wireless
    
K2
Published By: Kaseya     Published Date: Mar 12, 2015
This white paper describes the key characteristics of the changing environment and it identifies a new choice that IT managers have for meeting the growing set of management challenges.
Tags : 
it environments, cloud computing, mobility, big data, saas, iaas, service management, virtualization, public cloud, it management, infrastructure
    
Kaseya
Published By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of applications and file needs. As the world moves to the web and to the cloud, agencies are asking whether VDI is still a good fit for emerging mobility and BYOD needs. See this important infographic to learn more about the tradeoffs between VDI and emerging cloud technologies, and what you can do to take advantage of new solutions to drive improved mobile productivity across your entire organization.
Tags : 
vid, cloud alternatives, emerging mobility, mobile productivity, it management, bandwidth management
    
Lenovo
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: Microsoft     Published Date: Oct 24, 2016
This Technology Spotlight examines the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps. It also explores the role of Microsoft's Enterprise Mobility Suite (EMS) in the strategically important EMM market.
Tags : 
mobility, enterprise mobility management, software as a service, cloud, mobile security, remote access
    
Microsoft
Published By: Microsoft Office 365     Published Date: Jan 21, 2016
Small to mid-sized businesses today face a tough task; providing helpful collaboration tools that big businesses offer, without the large costs. Microsoft commissioned Spiceworks, a network of IT pros, to survey over 250 IT experts working at small to mid-sized businesses to tell us how to do more with less. The IT pros had this to say, “As a result of using a cloud approach, nearly 80% [of surveyed IT pros] said they’re saving money, seeing more productivity and better security.” Learn more in the free eBook and propel your small business into the cloud: • Costs. Provide better tools to increase availability, productivity, and security while keeping costs down. • Scale. Take advantage of self-servicing and discover the ability to quickly scale your business. • Mobility. Make accessing information on the go easier for your mobile workforce.
Tags : 
it management
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Apr 18, 2016
Learn more in the free eBook and propel your small business into the cloud: • Costs. Provide better tools to increase availability, productivity, and security while keeping costs down. • Scale. Take advantage of self-servicing and discover the ability to quickly scale your business. • Mobility. Make accessing information on the go easier for your mobile workforce.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: May 10, 2016
We’ve identified seven ways that moving to cloud-based productivity apps can: Improve your communication and teamwork Increase your company’s mobility Turn data into insights Download the e-book to learn how you can make the most of the cloud with Office 365.
Tags : 
    
Microsoft Office 365
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Mitel     Published Date: Dec 15, 2016
Step behind the scenes in this exclusive one on one interview as Daryl Reva, Mitel VP Cloud Marketing discusses mobility, contact center and cloud with Ray Chan, Director of Information Technology for the San Diego Padres. Hear how changing customer expectations, employee mobility and the rigors of hosting the 87th annual MLB All-Star Game inspired a major technology overhaul, including: A move to the Cloud Technology integrations in the contact center UCC and team collaboration applications
Tags : 
    
Mitel
Published By: Mitel     Published Date: Mar 30, 2017
Step behind the scenes in this exclusive one on one interview as Daryl Reva, Mitel VP Cloud Marketing discusses mobility, contact center and cloud with Ray Chan, Director of Information Technology for the San Diego Padres. Hear how changing customer expectations, employee mobility and the rigors of hosting the 87th annual MLB All-Star Game inspired a major technology overhaul, including: A move to the Cloud Technology integrations in the contact center UCC and team collaboration applications
Tags : 
cloud, technology integration, marketing, mobility, productivity
    
Mitel
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.