users

Results 1426 - 1450 of 1775Sort Results By: Published Date | Title | Company Name
Published By: Rapid7     Published Date: Nov 27, 2012
The "Bring Your Own Device" (BYOD) trend started in late 2009 and caught on with users faster than IT expected, especially as iOS and Android devices became dominant. This webinar will delve into the underlying risks associated with BYOD, and provide a simple step-by-step approach to mitigate their risks.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
    
AppSense
Published By: AppSense     Published Date: Nov 26, 2012
Download this case study to learn how Chandler Macleod's CIO was able to utilize the AppSense solution to remove the possibility of any users introducing an executable file to their network while reducing the number of their servers by 25%.
Tags : 
appsense, license compliance, security, application licensing, application security, reduce servers, application management
    
AppSense
Published By: AppSense     Published Date: Nov 26, 2012
This case study demonstrates how AppSense Application Manager is transparent to end-users, unobtrusive for administrators, and requires extremely little administration.
Tags : 
user experience, end-point users, appsense, application management, application manager, desktop security, end user experience
    
AppSense
Published By: IBM     Published Date: Nov 09, 2012
Many of the latest initiatives in the IT world are focused around aligning IT resources more closely with business users and solution needs. In this white paper, learn to make better business decisions with flexible, automated business rules.
Tags : 
operations decision management, it infrastructure, data management, automated business rules, automated business events
    
IBM
Published By: Citrix     Published Date: Nov 09, 2012
Today's firms encompass a diverse range of users, from power to casual users. It is a huge challenge to create a one size fits all solution to desktop virtualization. In this paper, learn how Citrix FlexCast enables flexibility for all workers.
Tags : 
citrix, desktop, virtualization, flexcast, citrix flexcast
    
Citrix
Published By: Riverbed     Published Date: Nov 08, 2012
Application delivery solutions sit at the nexus connecting users to business services and data, therefore, selecting between solution options is not a decision made lightly. Read on to learn about the business value and efficiency of Stingray.
Tags : 
riverbed, stingray, it infrastructure, optimization, data optimization, performance optimization
    
Riverbed
Published By: Webroot     Published Date: Nov 08, 2012
To Protect Mobile Users and Globally Dispersed Locations, Cascade Microtech Chooses Webroot for Web Security in the Cloud.
Tags : 
mobile users, mobility, case study, it security, web security, cloud computing
    
Webroot
Published By: Ericom     Published Date: Nov 05, 2012
The accelerating BYOD trend and the need to reduce IT overhead, organizations need to empower users with secure browser-based access to Windows Applications and desktops from any device. Learn how AccessNow empowers mobility and security.
Tags : 
ericom, html5, rdp, accessnowt, windows apps, desktops, mobility
    
Ericom
Published By: Webroot     Published Date: Nov 02, 2012
The experts agree that AV software is a must-have for business PC users, but it is necessary to take great care in choosing one. In this brief, you'll find that user experiences with AV solutions can vary widely.
Tags : 
malware attacks, antivirus security, endpoint solution, endpoint security, security solutions
    
Webroot
Published By: Janrain, Inc.     Published Date: Oct 29, 2012
Never before have digital marketers been blessed with such immense quantities of online customer data at our disposal, yet been so incapacitated by how to use it. This paper explores ways to collect value from customer related information.
Tags : 
janrain, user management, vibrant audience, online users, user engagement, big data, customer related information, collect value
    
Janrain, Inc.
Published By: Janrain, Inc.     Published Date: Oct 29, 2012
Learn how to collect, store, and leverage the social profile data of your most profitable website users, plus best practices and case studies for social login, sharing, gamification, and single sign-on. Get the paper now!
Tags : 
janrain, user management, vibrant audience, online users, user engagement, emerging marketing, advertising agencies, customer experience/engagement
    
Janrain, Inc.
Published By: IBM     Published Date: Oct 24, 2012
The world's appetite for media and entertainment is seemingly insatiable. New devices are enabling the use of new media in ways that were barely imaginable a few decades ago. Read on to learn more about analytics and personalization to attract users.
Tags : 
analytics, ibm, consumer behavior, consumer, user, media, cross channel marketing, social media
    
IBM
Published By: IBM     Published Date: Oct 24, 2012
If you met a valued customer face to face, you'd probably greet the person with a smile and a "hello." You'd want the communication and ongoing discussion to be personal and specific to the individual. Deliver -- Learn to connect with your users.
Tags : 
ibm, analytics, consumer behavior, consumer interaction, communication, email marketing, internet marketing
    
IBM
Published By: Box     Published Date: Oct 18, 2012
In a mobile-centric world, IT has a new challenge on its hands: ensuring that users can access and collaborate on content anytime, anywhere an on any device. Here are the top five challenges, and how to overcome them.
Tags : 
box, mobile collaboration, access, bring your own device, content, sharing
    
Box
Published By: Riverbed     Published Date: Oct 17, 2012
While SharePoint Server provides a rich suite of tools, geographically, users may still encounter issues which can impose on overall application performance. Tests outlined in this white paper include application performance and more.
Tags : 
wan optimization, riverbed, sharepoint, application processing
    
Riverbed
Published By: Splunk     Published Date: Oct 15, 2012
Learn how CloudShare allows users to efficiently create multi-VM environments, collaborate with others and deploy projects into production, with no background in IT-infrastructure required.
Tags : 
splunk, vmware, cloud computing, virtualization, it infrastructure, collaboration, it efficiency
    
Splunk
Published By: Oracle Corp.     Published Date: Oct 15, 2012
During this webcast Kamal Tbeileh, Sr. Principal Product Manager at Oracle, will discuss database access control best practices for all database users, including highly privileged users using Oracle Database Vault.
Tags : 
database, database access control, database security, database consolidation, compliance, oracle
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Oct 15, 2012
This survey, conducted by the Independent Oracle Users Group, examined more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions.
Tags : 
enterprise data, cloud computing, high availability, downtime, database infrastructure, database availability
    
Oracle Corp.
Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Read how your business can gain that advantage by delivering the type of mobile experience users have come to expect, from Michael Finneran of dBrn Associates and Brad Herrington of Interactive Intelligence.
Tags : 
mobile customer service, customer service, mobile experience, mobile apps, customer experience/engagement
    
Interactive Intelligence
Published By: Citrix Systems     Published Date: Oct 08, 2012
Today's organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working with demanding high-end applications, to task workers performing standard, relatively predictable processes. A one-size-fits-all approach to desktop virtualization cannot meet all the different requirements of these users.
Tags : 
citrix, desktop, virtualization, shared desktop, remote pc
    
Citrix Systems
Published By: BlackBerry     Published Date: Oct 03, 2012
This presentation on NFC security will provide an overview of the security protections built into the BlackBerry platform to protect users, application developers and enterprises.
Tags : 
blackberry, security, mobile security, blackberry
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, discover answers to your top questions about balancing the security of your corporation and its confidential information with the usability and convenience that your end-users want on their mobile devices.
Tags : 
mobile user needs, mobile security, mobile devices, blackberry
    
BlackBerry
Published By: Symantec     Published Date: Oct 02, 2012
Build Trusted Relationships with Software Users
Tags : 
symantec, code, adobe, certificates, software
    
Symantec
Start   Previous    51 52 53 54 55 56 57 58 59 60 61 62 63 64 65    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.