Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

secure devices

Results 1 - 25 of 158Sort Results By: Published Date | Title | Company Name
Published By: Dell PC Lifecycle     Published Date: Aug 02, 2018
Finding a balance between providing employees with mobility and diversity, and ensuring enterprise IT remains secure and cost effective, can be difficult for businesses to achieve. With 53% of IT leaders struggling to keep up with the increasing diversity of devices, organizations need a solution that can help them overcome these challenges. This webinar discusses how Dell PC Lifecyle family of solutions can streamline the needs of the workforce and satisfy a business’ IT requirements. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Aug 02, 2018
Finding a balance between providing employees with mobility and diversity, and ensuring enterprise IT remains secure and cost effective, can be difficult for businesses to achieve. With 53% of IT leaders struggling to keep up with the increasing diversity of devices, organizations need a solution that can help them overcome these challenges. This webinar discusses how Dell PC Lifecyle family of solutions can streamline the needs of the workforce and satisfy a business’ IT requirements. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Aug 02, 2018
Finding a balance between providing employees with mobility and diversity, and ensuring enterprise IT remains secure and cost effective, can be difficult for businesses to achieve. With 53% of IT leaders struggling to keep up with the increasing diversity of devices, organizations need a solution that can help them overcome these challenges. This webinar discusses how Dell PC Lifecyle family of solutions can streamline the needs of the workforce and satisfy a business’ IT requirements. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell PC Lifecycle
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Nov 08, 2018
You want your business to grow. Be profitable. And stay competitive. Having a robust network is key to your success. Cisco is the worldwide leader in technology. Our SMB portfolio delivers the reliable, scalable, and highly secure IT infrastructure that your business needs. Staying ahead of market trends is vital to the success of your business. Cisco can help keep your business on the move while helping to secure your data, devices, and infrastructure. To find out how, download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications
    
Commvault
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: VMware AirWatch     Published Date: Jul 21, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware AirWatch
Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
Quality matters, but despite advances made in video streaming technology, delivering great quality live video over the Internet is still not easy. There are challenges with predicting the scale and potential audience location; challenges with managing complex encoder and origin technology; challenges of delivering video securely and reliably over the Internet; and challenges of protecting live streams. Add to that the range of devices, the complexity of live event production, and the demand for HD and 4K image quality and you get a scenario that is more complicated than ever before.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Dell APAC     Published Date: Mar 01, 2019
With Dell EMC, you will be ready for your next step. Improve efficiency and ready your organization for expansion with secure and purpose-built solution, from devices to infrastructure.
Tags : 
    
Dell APAC
Published By: MobileIron     Published Date: May 23, 2016
Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.
Tags : 
security, mobile device, windows, best practices, streaming, device management
    
MobileIron
Published By: MobileIron     Published Date: May 23, 2016
Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415
Tags : 
security, mobileiron, best practices, windows, device management
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron
Published By: MobileIron     Published Date: Sep 07, 2017
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.
Tags : 
mobileiron, information technology, platform, security, mobile devices
    
MobileIron
Published By: MobileIron     Published Date: Sep 26, 2017
Today’s modern enterprise requires a comprehensive, unified platform like MobileIron Access, which is designed from the ground up to secure mobile apps, devices, and cloud services. MobileIron makes it easy to transform business by securing critical enterprise resources including desktop PCs, mobile devices, modern apps, and cloud services — all from a single point of control.
Tags : 
mobileiron, mobile, cloud, security, enterprise security
    
MobileIron
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.