users

Results 1651 - 1675 of 1761Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, discover answers to your top questions about balancing the security of your corporation and its confidential information with the usability and convenience that your end-users want on their mobile devices.
Tags : 
mobile user needs, mobile security, mobile devices, blackberry
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
This presentation on NFC security will provide an overview of the security protections built into the BlackBerry platform to protect users, application developers and enterprises.
Tags : 
blackberry, security, mobile security, blackberry
    
BlackBerry
Published By: ServiceNow     Published Date: Apr 19, 2013
Learn how savvy enterprises, like Tickets.com, Verisign and Omnicare, use ServiceNow as a platform to enable business users to rapidly create applications with IT’s full guidance and support. During this webinar, you will discover how ServiceNow is enabling organizations to increase their competitive agility, user satisfaction and productivity, all while enhancing IT's value to the business.
Tags : 
automation, platform, applications, competitive agility, productivity, user experience
    
ServiceNow
Published By: CDW     Published Date: Oct 10, 2013
The Georgia Dome deployed a Wi-Fi network that lets fans browse the web on smartphones, view replays and communicate via social media.
Tags : 
georgia dome, dome stadium, wireless crowd, wireless users, wifi support, update to wifi, wireless connectivity, peak usage
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: HP and Intel ®     Published Date: May 27, 2014
This checklist is designed to avoid getting onto a straight and narrow path that provides little flexibility to branch out and merge with other IT strategies and visions.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: Thawte     Published Date: Dec 29, 2015
This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Tags : 
cryptography, encryption, security
    
Thawte
Published By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
    
IBM
Published By: NetApp     Published Date: Dec 08, 2014
VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere.
Tags : 
netapp, flash, fas, vmware, vdi, fas8000, vsphere, horizon view
    
NetApp
Published By: NetApp     Published Date: Dec 08, 2014
This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.
Tags : 
flash storage, flash solutions, it-strategies, netapp, business objectives, solid-state storage, it strategies
    
NetApp
Published By: Logicalis     Published Date: Mar 17, 2014
The success of an outsourced service desk initiative really comes down to one thing: the satisfaction of your users. As you seek a provider, keep that in mind.
Tags : 
    
Logicalis
Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection
    
Symantec
Published By: IBM     Published Date: Jan 09, 2014
Organizations are looking to eliminate data center complexity, sprawl and underutilization. This requires solutions that can boost efficiency and economics, while delivering high-performance capabilities. Read the white paper and see how users and industry analysts alike trust IBM Power Systems to break free from costly and impractical systems.
Tags : 
it solutions, smart analytics, analytics systems, testimonials
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
cognitive internet, iot, iot apps, intent data
    
IBM
Published By: Cisco     Published Date: Dec 08, 2015
Driven by budget pressures and the growth of cloud-hosted applications, mobility, and bandwidth-hogging applications such as video, many IT organizations are actively considering direct Internet access (DIA) at their branches. DIA offers two compelling benefits: (1) it can substantially reduce operating costs by freeing up costly WAN bandwidth for mission-critical applications, and (2) it offers a better experience for users accessing applications hosted in the public cloud.
Tags : 
direct internet access, cisco, canada, dia, wan, wide area network
    
Cisco
Published By: Riverbed     Published Date: Apr 14, 2017
Many organizations transitioning from on-premises Microsoft applications to Office 365 will experience performance problems due to geographic factors and use of the Internet for connectivity. IT can minimize performance issues and deliver an acceptable experience to end users by paying careful attention to network design.
Tags : 
    
Riverbed
Published By: Marketo     Published Date: Mar 13, 2014
Savvy B2B marketing leaders are going beyond revenue performance management to transform marketing into the architect of engagement across the customer life cycle. Lead-to-Revenue Management (L2RM) platform vendors are stepping up with tooling that enables customer-centric, multichannel, personalized marketing — at scale. Companies that have implemented an L2RM automation platform have seen results in both organizational maturity and business impact. According to a Forrester survey, L2RM platform users contribute more to the sales pipeline, have higher levels of process maturity, measure results more holistically and collaborate better with their sales colleagues.
Tags : 
marketo, forrester, b2b, l2rm, lead to revenue management, revenue management, marketing maturity, process maturity
    
Marketo
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape
Published By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : 
mobile, wi-fi, wireless, cisco, research
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : 
mobile, wi-fi, wireless, cisco, research
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : 
mobile, wi-fi, wireless, cisco, research
    
Cisco
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.