apple

Results 76 - 100 of 176Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud, mobile, application deployment, application delivery
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : 
unica, email, emarketing, esp, email trends, social media, sms, spam, mobile email, templates, email marketing services/software, list management, mobile marketing, social media marketing
    
Unica
Published By: MicroStrategy     Published Date: Mar 16, 2011
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple's mobile devices.
Tags : 
microstrategy, mobile business intelligence, bi application, security, data access, apple mobile device, data transmission, data storage, data protection
    
MicroStrategy
Published By: Citrix Systems     Published Date: Sep 06, 2013
A technical how-to guide— updated for Android 4.2, iOS 6.1, and Windows Phone and Surface 8.
Tags : 
citrix, apple ios, enterprise information, smartphones, enterprise computing
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 27, 2014
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, apple, android, byod, tablet, mobile, citrix byod, microsoft windows tablets
    
Citrix Systems
Published By: CDW     Published Date: Nov 12, 2012
Whether assigned or brought in ad hoc by staff, mobile-computing devices require MDM to protect enterprise IT assets.
Tags : 
cdw, mdm, mobile device management, cross-platform, apple, ios
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
An ambitious mobile strategy built around tablets is helping Hyatt Hotels reach new levels of customer service.
Tags : 
mobile strategy, case study, wireless strategy, customer service, modernizing hospitality, apple, ipad, technology for businesses, hospitality, hotels, hyatt hotels, convergence, network performance management, mobile applications, customer experience/engagement
    
CDW
Published By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
    
Cisco
Published By: VMware AirWatch     Published Date: Sep 21, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware AirWatch
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
View this white paper to get a complete list of products that Shavlik covers.
Tags : 
shavlik, 3rd party application, custom patching, microsoft operating system, wsus, adobe, apple
    
Shavlik Technologies
Published By: Code42     Published Date: Apr 22, 2016
Dramatic changes are underway in offices around the world, with Macs rapidly gaining market share in modern enterprises. Read this white paper to discover the industry-wide transitions to Macs, and tips to smooth your integration of Apple devices.
Tags : 
mac, code 42, apple devices, modern offices
    
Code42
Published By: Delta Risk     Published Date: Jun 07, 2016
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions
    
Lumension
Published By: Central Desktop     Published Date: Jul 05, 2012
It's no secret that there has long been friction between agencies and clients. For those of you who work in marketing on either side of the equation, we'vegrappled with this for years.
Tags : 
central desktop, client- collaboration, emerging marketing
    
Central Desktop
Published By: Apple Corporation     Published Date: Dec 05, 2013
Explore the world of business apps for iPad and start transforming the way you work. Discover apps to stay productive in the office or on the go. There are a world of possibilities with in-house app development for iPad. Explore what businesses are creating in-house and get started building breakthrough apps for your employees. With apps from the app store or in-house apps, you'll always have the right information at the right time. You can even learn about different ways on how apps can be distributed in your organization. There will also be a Q&A segment where viewer questions will be answered by Apple Business Experts skilled in iPad integration and deployment.
Tags : 
apple, free online seminar, business, apps for ipad
    
Apple Corporation
Published By: Apple Corporation     Published Date: Jan 16, 2014
iPad is changing the way companies across the globe use mobile devices for work. The Wi-Fi + cellular connectivity and 10-hour battery life of iPad help you stay connected all day long. iPad allows you to present with high impact in any situation, whether it is a sales meeting or presentation to a large audience. See how keynote can be used to create or edit presentations and learn how to use airplay mirroring, control your presentations and view important meeting notes. You will also see how customers are using iPad to mobilize their business. There will also be a Q&A segment where viewer questions will be answered by Apple Business Experts skilled in iPad integration and deployment.
Tags : 
apple, free online seminar, applications, presentations, high impact
    
Apple Corporation
Published By: Enterprise Mobile     Published Date: Aug 07, 2014
Learn about the unique business features Apple offers and how the right deployment strategy will benefit your organization.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile deployment, mobility deployment, apple, ios
    
Enterprise Mobile
Published By: IBM     Published Date: Jun 20, 2013
The message is simple: Trust has been lost and the digital world is here. Successful relationships with customers in the digital world are high-trust relationships. It is time for bankers to rebuild trust at the same time as developing all the communications and analytical advantages of digital technology. There is no other way. The highly digitalised, non-bank competitors are already taking the best parts of banking. Time is short. Is Apple about to join the fray? Is Amazon? Is Facebook?
Tags : 
customer, trust, banking, retail
    
IBM
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, sales
    
E-SignLive by Silanis
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
While the consumer benefits of Apple devices are well known, less attention is paid to their role in an enterprise environment. It’s time to start paying attention. Apple offers a number of features built for business and as the first company approved for mobile deployments by the Apple Consultants Network, Enterprise Mobile has unique insight into these features.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile deployment, mobility deployment, apple, ios, enterprise applications, human resource technology
    
Enterprise Mobile
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability
    
Equinix
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.