Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

corporate app

Results 26 - 50 of 203Sort Results By: Published Date | Title | Company Name
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Citrix     Published Date: Jul 25, 2014
Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.
Tags : 
email, mobile, collaboration, smartphone, tablets, productivity
    
Citrix
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications
    
Good Technology Corporation
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
    
Red Hat
Published By: IBM APAC     Published Date: Aug 25, 2017
Transitioning from traditional IT to cloud IT is not an all-at-once, big bang effort. Rather, the cloud adoption process should be an agile, incremental process. And the first part of that process is understanding the different cloud models. Contrary to popular belief, cloud isn’t necessarily only public cloud, multi-tenant, and hosted in a vendor’s data center. It can also be private cloud, single-tenant, and/or hosted in a corporate data center. Often the best solution is a hybrid combination of these options. This paper will show you the advantages of hybrid cloud applications and explore the considerations you should make to find an optimal solution for your organization.
Tags : 
cost reduction, cost optimization, business agility, innovation, business models
    
IBM APAC
Published By: IBM     Published Date: Oct 10, 2013
As the primary focus of IT moves from increasing IT productivity through virtualization and cloud computing to enhancing business productivity, the biggest challenge that businesses face in executing corporate strategy is focusing the right people and resources on strategic initiatives. A key element in enhancing business productivity is driving down costs, which can help free up the funds needed to make strategic investments. Businesses also need a means to more effectively orchestrate how IT interacts with business processes and critical application environments. The solution lies in using managed services. Read here to find out more on how companies gained significant and quantifiable benefits from using managed services.
Tags : 
business value, it productivity, virtualization, cloud computing, enhancing productivity, business productivity, executing corporate strategy, strategic initiatives
    
IBM
Published By: Cisco     Published Date: Jan 06, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, it management
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
customer engagement, business practices, technology, design management
    
Cisco
Published By: Oracle     Published Date: Nov 01, 2013
Two dominant trends are potentially reshaping the role of the HR function in the corporate world. The first relates to the rapid growth of the knowledge economy. In this environment, a committed, appropriately skilled and prudently deployed workforce is critical in order to develop new products and outstrip the competition. Second, many administrative functions that were formerly handled by HR departments, such as payroll and pensions, have now been farmed out to third parties. Indeed, research reveals that more than two-thirds of companies outsource a portion of their HR functions. This report by the Economist Intelligence Unit investigates whether the HR function is forging a close and robust relationship with the CEO. It also explores the nature of these working relationships, how they have been affected by the economic downturn and how they vary across industries and regions.
Tags : 
zenithoptimedia, oracle, ceo perspectives, hr department drives growth, economist intelligence unit, ibm, hr and organizational strategy, strategic influence of hr
    
Oracle
Published By: Oracle     Published Date: Nov 13, 2013
Two dominant trends are potentially reshaping the role of the HR function in the corporate world. The first relates to the rapid growth of the knowledge economy. In this environment, a committed, appropriately skilled and prudently deployed workforce is critical in order to develop new products and outstrip the competition. Second, many administrative functions that were formerly handled by HR departments, such as payroll and pensions, have now been farmed out to third parties. Indeed, research reveals that more than two-thirds of companies outsource a portion of their HR functions. This report by the Economist Intelligence Unit investigates whether the HR function is forging a close and robust relationship with the CEO. It also explores the nature of these working relationships, how they have been affected by the economic downturn and how they vary across industries and regions.
Tags : 
zenithoptimedia, oracle, ceo perspectives, hr department drives growth, economist intelligence unit, ibm, hr and organizational strategy, strategic influence of hr
    
Oracle
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco     Published Date: Apr 11, 2016
The role of the CIO has changed more in the past five years than any other position in the corporate world. IT leaders are now partners with business leaders, and they are tasked with helping companies respond to competitive pressures as quickly as possible. In an effort to improve overall IT agility, compute and application technology has evolved significantly through the use of mobility, virtualization and cloud computing. However, the network itself has yet to evolve, limiting the overall agility of IT today. These technology shifts have transformed almost every part of the enterprise. However, to maximize the potential of these investments, the network must also transform. Read more to learn how.
Tags : 
cisco apic, network operations, it agility, cloud computing, virtualization, networking, it management
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
design guide, customer engagement, design management, system management
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA
Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, design guide, system design
    
Cisco
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 19, 2019
WE LIVE IN A WORLD WHERE WORK IS NO LONGER A PLACE WHERE YOU GO. It’s what you do — a dynamic activity that people expect to accomplish anywhere, anytime, on any device. Supporting today’s workforce requires a digital platform that empowers productivity and ensures security and management at scale everywhere: on site, on the road, or in the cloud. According to IDC, by 2020, mobile workers will account for 72 percent of the U.S. workforce. And they won’t be just checking email. These workers want to be productive 24/7. That means access to data, documents, and corporate apps anywhere, anytime, on any device. Enterprises, however, are struggling to allow more workers to use additional devices from a multitude of locations.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.