Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

corporate app

Results 1 - 25 of 198Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues. As our corporate data stores have grown in both size and subject area diversity, it has become clear that a strategy to address data is necessary. Yet some still struggle with the idea that corporate data needs a comprehensive strategy. There’s no shortage of blue-sky thinking when it comes to organizations’ strategic plans and road maps. To many, such efforts are just a novelty. Indeed, organizations’ strategic plans often generate very few tangible results for organizations – only lots of meetings and documentation. A successful plan, on the other hand, will identify realistic goals along with a r
Tags : 
    
SAS
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Today’s globally distributed and diverse workforce needs flexible yet straightforward access to the corporate network, regardless of user location, device type, employee affiliation, and application location (on-premises, SaaS, IaaS). Expedience and fluidity can’t come at the cost of security, especially given the realities of modern cybercrime. Learn more about the five demands you should make of an updated comprehensive application access solution.
Tags : 
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Corporate managers responsible for multiple fuel tank locations need remote technology applications to maximize their information use and increase the reach of their resources. Success when planning new remote technology projects can be measured in terms of increased profitability or ROI if the planners adequately address the build vs. buy decisions required when choosing the necessary hardware, software, deployment and integration strategy.
Tags : 
fuel, gas, roi, return on investment, infrastructure, cost control, business intelligence, cost efficency, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: Radius Solutions     Published Date: Apr 29, 2008
"Lean" is defined as a process to improve manufacturing and service operations, reduce waste, improve quality and drive down cost. While many packaging companies have embraced a number of Lean Manufacturing concepts, many have yet to fully realize the benefits of a fully-integrated Lean environment. Leveraging an ERP system that embraces "Lean" principles and incorporates industry specific best practices can facilitate and support the process. In this white paper, learn how lean manufacturing can apply to printing and packaging, and how an ERP system fits into the process.
Tags : 
erp, lean, lean methods, lean manufacturing, printing, packaging, radius, radius solutions, scm, supply chain
    
Radius Solutions
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management
    
VMware AirWatch
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Microsoft® Exchange® Server is the undisputed industry leader in corporate messaging. With the release of Microsoft Exchange Server 2007, not only does Exchange continue to provide rich, effi cient access to e-mail, calendars, attachments, contacts, and more, but Exchange Server 2007 adds some exciting infrastructure and performance improvements as well. F5’s comprehensive Application Ready infrastructure for Exchange Server 2007 allows organizations to easily provide additional performance, security and availability, to ensure maximum ROI with the minimum amount of work.
Tags : 
microsoft exchange 2007, application ready network guide, microsoft exchange server, corporate messaging, roi, infrastructure optimization, application security, it management, infrastructure
    
F5 Networks Inc
Published By: Adobe     Published Date: Oct 29, 2015
This white paper explains how training apps are emerging as an important component of any organisation’s ongoing digital transformation.
Tags : 
corporate training apps, mobility, mobile, mobile learning, training, digital training, e-learning
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
This white paper explains how training apps are emerging as an important component of any organisation’s ongoing digital transformation.
Tags : 
corporate training apps, mobility, mobile, mobile learning, training, digital training, e-learning
    
Adobe
Published By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
    
MobileIron
Published By: AWS     Published Date: Feb 19, 2019
Microsoft Windows Server 2008 and SQL Server 2008 are nearing end of support, so now is the time to include these Microsoft workloads into your cloud migration strategy. Learn how this will set the stage to help you accelerate digital transformation, increase innovation and reduce the costs of your legacy and corporate applications.
Tags : 
    
AWS
Published By: NetApp     Published Date: Dec 15, 2014
Organizations expect their IT departments to deliver a SAN storage infrastructure that can support faster rollout of applications and services, continuous and fast access to data in key applications, and efficient scale to address corporate data growth without comparable growth in IT expenses. This IDC white paper reviews the key SAN storage features required to meet such challenges and the NetApp SAN storage portfolio offerings that best address your needs.
Tags : 
san storage, business workloads, access to data, data growth, it expenses, data center
    
NetApp
Published By: IBM     Published Date: Jul 14, 2016
Enterprise risk management (ERM) is moving to the top of corporate agendas, and evidence shows strategic risk is a key factor in a robust ERM framework. Check out this white paper from risk management pioneer James Lam. In it, Lam explains why every organization should be focusing on strategic risk. You'll learn how to integrate risks into the planning process, use economic capital and risk-adjusted return on capital to measure risk, and how to apply these results.
Tags : 
best practices, risk management, enterprise, technology, frontier, it management, enterprise applications
    
IBM
Published By: SAP     Published Date: Jun 12, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application. Download this white paper to discover five best practices that can help make your career site your # 1 recruiting asset.
Tags : 
    
SAP
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application.
Tags : 
    
SuccessFactors, an SAP Company
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: ThousandEyes     Published Date: Nov 17, 2016
Traditional performance management solutions were built for applications owned by the enterprise and run inside the corporate network. The explosive adoption of Software-as-a-Service (SaaS) and cloud applications have brought new performance management challenges that push the limits of the enterprise infrastructure and break these traditional approaches. In this white paper, we examine why existing solutions don’t work for the modern enterprise and discuss a fundamentally different approach that is needed to address the new challenges. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Aug 04, 2017
Traditional enterprise performance management solutions were designed for applications running inside the corporate network and are unable to provide visibility beyond the corporate network perimeter. With the rapid adoption of Software-as-a-Service (SaaS) applications by enterprises, these performance management solutions that are completely blind to issues outside the enterprise, are unable to help IT teams troubleshoot performance problems with the SaaS applications.
Tags : 
information technology, software as a service, management solutions, corporate network
    
ThousandEyes
Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
    
Jamf
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.