Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 5951 - 5975 of 6129Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Your employees want easy and quick access to files from any device—but if you don’t provide this flexibility, they will go around you and upload company data to unauthorized cloud services. It’s time to prevent data leakage with a file sharing solution that combines security and convenience. In this white paper, you’ll learn how file sharing goes beyond storage to accelerate your business with: • Flexible access to files from any device and any location • Streamlined security and access control • Choice of private and public cloud storage
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
For emerging businesses, investing in the right technology can accelerate their growth and enhance their bottom lines. As more companies expand their workspaces with virtual teams and work-from-home policies, a good first step is to invest in a secure, flexible content collaboration solution—one that is easy to integrate and use. It should give you and your teams secure access to files, apps, and data from any device and any location to accelerate productivity. Not all file sharing solutions are the same. Download our white paper to determine if a modern content collaboration platform can help you: • Streamline workflows • Improve operational efficiencies • Make the organization more secure and compliant • Deliver the desired ROI
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Your small business is primed for a growing future—but with every new employee and client, you have more files to store and manage. Without a strong file sharing solution, it’s tough for your IT team to manage secure, anywhere access to key files for all your users. The solution is to adopt an enterprise-grade file sharing platform that grows with you. In this e-book, you’ll learn how enterprise-grade file sharing supports your growth with: • More efficient collaboration processes • Streamlined security and compliance • Unified access to files across locations and devices
Tags : 
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Nov 17, 2016
Effective quality management lets you improve the performance of contact center agents—and deliver the customer experience your business expects. The ICMI Tool Kit: Quality Management in the Contact Center provides valuable tips you can apply to start improving your contact center operations today. Developed by International Customer Management Institute (ICMI), a leader in contact center training and consulting, the tool kit lays out the foundations of an effective quality management program and offers a step-by-step approach to creating an effective program. Then it provides details to help you: • Perform effective coaching using the SAFE coaching framework • Calculate the ROI of your training and coaching investments • Developing a peer mentor program
Tags : 
    
8x8 Inc.
Published By: IBM     Published Date: Jan 19, 2017
Watch this video to learn how IBM Datacap and Box enable better customer centricity through the capture of data across mobile devices, scanners, email, fax and files. This solution works with Box to store documents in the cloud.
Tags : 
ibm, analytics, data, ibm box, customer centricity, ibm datacap, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 19, 2017
Data is only as good as the insights it produces, the actions it influences, and the results it fosters. That’s the secret recipe for data management. Your business stakeholders depend on data-based insights to drive decisions and priorities throughout the organization. Insights based on sound data practices can give your business a competitive advantage in the marketplace. Is your data management system ready to support your business? Find out using Forrester’s Data Management Infrastructure Self-Assessment Tool. IBM has licensed this tool to help you identify the areas of strength and opportunities for improvement.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
There are myriad software products, from complete CRM platforms that offer analytics to standalone or add-on software products that focus solely on analytics. There are analytics apps that can be added to your existing CRM platform. Or there’s the option to outsource analytics to a growing number of service providers. “The technologies are changing rapidly. There are a zillion startups offering either new tools or technologies, so it is kind of hard to navigate,”Mike Gualtieri, an analystfor Forrester Research Inc. in Cambridge, Mass., said in a recent webcast on analytics. “There isn’t just one platform that you’re going to need. There’s a whole ecosystem of platforms.” Having the right people on staff who know how to use the technology is equally important, analysts say. Analytics aren’t just for statisticians anymore—they’re used by sales, marketing and customer service teams in daily decision making.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Learn how to protect corporate data when users use personal devices for work. The rapid proliferation of mobile devices entering the workplace appears to be like divine intervention to many IT leaders. Mobile devices and their apps have transformed the way we live – how we communicate, travel, shop, work and so much more. This mobility transformation has been so radical, so revolutionary, that it is hard to imagine life without these devices. Bring Your Own Device (BYOD) was born and employees followed with fervor.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
In today’s highly digital world, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses in order to deliver an optimal user experience. The IBM MaaS360 suite allows for a robust app development platform where you can increase portability and interoperability to enable and support every mobile user in your organization. Download this e-book to see how you can create the best mobile environment for your users and employees. All of the Enterprise Mobile Management tools and services needed to deliver the optimal user experience to every user, wherever they are, whatever app they are using, and whenever they need resources, are well-integrated into the MaaS360 suite from IBM.
Tags : 
enterprise management, mobile management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 16, 2017
When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Many organizations face access management chaos. As applications and resources have spread across on-premise data centers and multiple cloud providers, users are often accessing these resources from anywhere and on multiple devices. These simultaneous trends have left access management systems fragmented and access polices inconsistent, resulting in an environment that is expensive to maintain and challenging to secure.
Tags : 
access management, integrated platform, cloud security, enterprise security, data security
    
IBM
Published By: Lookout     Published Date: Dec 13, 2016
Read why analyst firm Ovum says there is "an urgent need for protection systems” to secure enterprise mobile devices.
Tags : 
security, threat detection, mdm integration, root detection
    
Lookout
Start   Previous    232 233 234 235 236 237 238 239 240 241 242 243 244 245 246    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.