Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 351 - 375 of 1079Sort Results By: Published Date | Title | Company Name
Published By: Mitel     Published Date: Apr 07, 2017
Mitel Mobilität Das Ausmaß und die Geschwindigkeit der Veränderungen, die Ihr Unternehmen erfährt, kann von zahlreichen Faktoren beeinflusst werden: Der wirtschaftlichen Lage, durch Wachstum des Unternehmens, Technologiesprünge, die Dynamik eines bestimmten Markts oder einer bestimmten Region. Zusammen tragen sie oft zu turbulenten Zeiten bei. Wenn Ihr Unternehmen wettbewerbsfähig bleiben und neue Chancen nutzen soll, ist die Fähigkeit, den Wandel vorherzusehen und schnell darauf zu reagieren, von erheblicher Bedeutung. Im Folgenden beschreiben wir fünf Möglichkeiten, wie Sie die geschäftliche Agilität in Ihrem Unternehmen steigern können.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
La plupart des entreprises savent distribuer les systèmes informatiques afin de réduire le nombre de défaillances dans ce domaine. Un plus petit nombre d’entreprises réfléchit suffisamment à optimiser la disponibilité de leur bien le plus précieux : les ressources humaines ! En distribuant les deux, les entreprises peuvent éliminer des zones de risques et surmonter de nombreuses menaces. Voici cinq façons d’améliorer la continuité de l’activité en relocalisant ou en répartissant votre force de travail.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Mitel Mobilität Wenn es früher darum ging, die besten Mitarbeiter zu finden und zu halten, kam es auf den traditionellen Arbeitsplatz in einem repräsentativen Gebäude mit eigenen Büros in erstklassiger Lage an. Dieses Konzept eines Arbeitsplatzes in einem festen Büro, das wir jeden Tag aufsuchen, gilt nicht mehr. Es ist bei bestehenden und neuen Mitarbeitern nicht mehr gefragt und akzeptiert bzw.für diese nicht mehr interessant. Die heutige Generation der Arbeitskräfte hat eine ganz andere Vorstellung vom Arbeitsleben, die oft wie folgt zusammengefasst wird: „Mein Arbeitsplatz ist überall dort, wo ich mich gerade befinde, und mein Arbeitgeber stellt mir die Tools zur Verfügung, damit ich meine Arbeit überall erledigen kann, wo ich möchte.“ Wir zeigen Ihnen fünf Möglichkeiten, mit Mobility die besten Mitarbeiter zu finden und zu halten.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 25, 2018
It’s time to find a new communications solution for your company. Before you start your search, consider this: No two company’s operations are quite the same and different organizations benefit from different types of phone systems. Understanding the factors that are driving many businesses to move their communications to the cloud will help you determine if a cloud communications solution is right for you. Here are seven operational trends propelling today’s move to Unified Communications as a Service (UCaaS). Check off each statement that rings true for your company. The more checks, the more your company will excel in the cloud.
Tags : 
cloud, business, communications, company, organization
    
Mitel
Published By: Oracle Oracle Marketing Cloud     Published Date: Oct 18, 2015
B2B-Transaktionen werden nicht mehr ausschließlich vom Vertrieb vorangetrieben. Zumindest nicht in der ersten Hälfte des Kaufprozesses. Umfragen haben ergeben, dass mehr als die Hälfte der Informationssammlung zu Produkten und Lösungen online bereits stattgefunden hat, bevor jemand mit dem Vertrieb spricht.
Tags : 
digital body language, customer engagement, digital content, digital strategies
    
Oracle Oracle Marketing Cloud
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago – through VPNs, proxies, and remote desktops. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Rosetta Stone     Published Date: Mar 01, 2017
Sie wollen in die Fremdsprachenkompetenzen Ihrer Mitarbeiter investieren? Sabine Schnorr, Director Central Europe von Rosetta Stone, hat zusammengefasst, welche aktuellen Entwicklungen die Branche nachhaltig beeinflussen und welche Trends Unternehmen unbedingt kennen sollten.
Tags : 
    
Rosetta Stone
Published By: Jamf     Published Date: May 04, 2017
"When contemplating offering Macs to your workforce, the question of cost inevitably comes up. “Macs are great, but I can buy two PCs for the same price as one Mac,” is a common mentality within IT departments. However, when comparing the total cost of ownership associated with providing basic services, software, management and support, the outcome (surprising to some) favors Mac over PC. But how can this b
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: Brainshark     Published Date: Aug 02, 2017
Whether your sales reps are 25 or 65, sales enablement leaders all have the same goal: to ensure that reps are prepared to have impactful conversations with each and every buyer. However, the preferred methods of sales coaching change from generation to generation. Thankfully, sales coaching technology helps sales enablement leaders bridge that gap. This exclusive eBook provides details on how to use technology to alter your coaching strategy to appeal to next-gen sales reps, including: • Mobile and video-based coaching • Options for both formal and informal learning • Coaching for both individual and organizational mastery
Tags : 
next-gen sales force, sales enablement, coaching, salesforce
    
Brainshark
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
Ein Überblick über die gesamte Bandbreite der mobilen Risiken für Unternehmensdaten Es ist an der Zeit, das unternehmensweite Risikomanagement zu ändern. Mobilgeräte spielen in unserem privaten und beruflichen Leben eine zentrale Rolle. In der überwiegenden Mehrheit aller Unternehmen liegt der Schwerpunkt jedoch nach wie vor auf dem Schutz traditioneller PC-Endgeräte. Um diese Entwicklung zu fördern, hat Lookout die Matrix für mobile Risiken entwickelt. Sie dient dazu, Sicherheitsorganisationen für das Risikospektrum von Mobilgeräten zu sensibilisieren und Daten bereitzustellen, die die Häufigkeit von Sicherheitsrisiken für mobile Plattformen veranschaulichen.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
APIs represent a great opportunity for the enterprise to integrate applications quickly and easily. But APIs can be a double-edged sword: promising agility, while at the same time increasing risk. But if an organization can address API security as an architectural challenge long before any development takes place, it can reap the rewards of this technological breakthrough safely and securely.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: Wasabi     Published Date: Nov 13, 2018
As state and local governments join the digital revolution, it’s increasingly important that they find safe, effective and efficient ways to store the data they’re creating. In this case study you’ll see how an integrated solution from Wasabi Hot Cloud Storage and Commvault Complete Backup gave one municipality the security they needed while increasing performance and cutting costs. This city had been using Amazon Glacier but was frustrated with the speed and unpredictable fees associated with retrieving their data. In turning to Wasabi they were able reduce costs by 80% and increase speed over 6x. Plus since Wasabi offers just one tier of service with one price and no fees to retrieve your data they were able to simplify both the process and budgeting. Between Wasabi and Commvault their skyrocketing data needs now scalable solution that gives them the security and performance they need for significantly less than they were paying before. To learn more please download the case study.
Tags : 
    
Wasabi
Published By: Wasabi     Published Date: Nov 13, 2018
As cams and digital video become more critical to law enforcement, their success will be in large part dependent on the ability to efficiently store and access that data. In this case study we look at Novus Insight, a leading integrator of managed video storage for law enforcement agencies, and their decision to use Wasabi Hot Cloud Storage. Novus is tasked with helping law enforcement manage the massive volumes of digital video evidence that body and dash cams are creating. Not a simple proposition for these budget and resource constrained public agencies. After surveying the available options Novus found going with Wasabi an easy choice. Wasabi’s revolutionary storage technology allows for an unprecedented combination of speed, affordability and security. It not only brings Novus the instantly scalable cloud solution they need, it dramatically improves performance and economics at the same time. To learn more about how Novus and Wasabi are helping enable better policing through bette
Tags : 
    
Wasabi
Published By: Wasabi     Published Date: Nov 13, 2018
In this tech brief, learn how Wasabi Hot Cloud Storage is lowering costs and increasing speed for backup and recovery applications. Wasabi is transforming cloud storage with a radical combination of speed, affordability and security. It offers backup and recovery platforms an extremely cost-effective solution that at the same time improves performance. Eliminating the complex tiers and pricing structures you find with traditional cloud storage options, Wasabi is 80% less than and 6x faster than Amazon S3 and built to be simple and flexible. It works with any Amazon S3 backup and recovery platform or utility. Cloud storage has become a compelling alternative to physical media or secondary data centers for data protection and Wasabi takes it to the next level. Download the Wasabi tech brief to learn more.
Tags : 
    
Wasabi
Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric
Published By: Zendesk GmbH     Published Date: Apr 24, 2018
Zendesk beauftragte das Marktforschungsinstitut Forrester Consulting mit einer „Total Economic Impact™“-Studie zur Untersuchung des potenziellen ROI, der sich für Unternehmen ergibt, die die Produktfamilie von Zendesk einsetzen. Um die Kosten und den Nutzen der Implementierung von Zendesk besser zu verstehen, befragte Forrester fünf Firmen, die Erfahrung mit Zendesk-Produkten haben. Aus den befragten Firmen wurde dann ein Verbundunternehmen erstellt. Die Ergebnisse dieser Untersuchung sind nachfolgend zusammengefasst: Finanzielle Zusammenfassung der risikobereinigten Ergebnisse über drei Jahre
Tags : 
    
Zendesk GmbH
Published By: Applause Israel     Published Date: Jun 19, 2018
APPLAUSE CASE STUDY ACCELLION THE INCREASING IMPORTANCE AND COMPLEXITY OF DIGITAL EXPERIENCES Maintaining a strong digital presence is critical as digital experiences are now the front door for your brand. Websites, mobile apps, and connected devices are all different ways for you to connect with your customers on a deeper level, and foster a stronger relationship of trust and loyalty. While you now have a wide-open avenue to reach customers more effectively, you also need to account for a whole new level of complexity, especially in the mobile space. Millions of people can download the same mobile app and have entirely unique experiences. This is a result of how fragmented the digital world has become. ScientiaMobile counted 45,000 different device profiles on the market today, and estimates that this rate of fragmentation will only increase heading into the future. On top of this variability is the wide range on contexts in which your customers can be relying on your mobile app to wo
Tags : 
    
Applause Israel
Published By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : 
devops, devops tools, continuous delivery, devops methodology
    
Splunk
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.