mobile organization

Results 1 - 25 of 411Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
A mobile, flexible work experience doesn’t just help you attract the best employees—it also helps your organization become more productive and innovative. Read this ebook to find out how Citrix Workspace can help you: • Empower employees and teams anywhere, on any device • Simplify and improve both security and endpoint management • Adopt new technologies more quickly and effectively
Tags : 
    
Citrix ShareFile
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
Starbucks uses Workplace by Facebook to connect partners across geography, level, between field and headquarters. Workplace allows mobile engagement from partners who do not sit at a desk all day. A few months after introducing Workplace, more than 80% of the organization’s store managers were actively using it weekly, sharing knowledge and best practices and helping one another.
Tags : 
    
Workplace by Facebook
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Panasonic     Published Date: Apr 23, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agency’s mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: Red Hat     Published Date: Mar 28, 2019
Digital business brings to mind innovative technologies: mobile devices, intelligent sensors, wearable devices, virtual reality, chatbots, blockchain, machine learning, and other technology. For some, it also reflects the rapid rise of new digitally native businesses that have disrupted traditional business models and destabilized established companies and industry sectors. For the majority of organizations, digital business means pivoting to a culture of organizational agility, where the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. As most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility.
Tags : 
    
Red Hat
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: MobileIron     Published Date: Feb 12, 2019
Mobile solutions can be insecure and risk-prone. With MobileIron Threat Defense, healthcare organizations can immediately determine if a user’s mobile device is compromised, if any network attacks are occurring, and if malicious apps are installed on the device.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 12, 2019
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. This paper examines some current mobile threat defense approaches to help organizations understand where traditional solutions may fall short — and how machine learning-based threat defense can expand upon those capabilities by providing immediate, on-device protection against mobile attacks.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 12, 2019
The adoption of mobile and cloud technologies is driving massive change in organizations around the world. These new technologies enable organizations to streamline business processes, lower costs, and help employees work productively anywhere. However, securing mobile apps and cloud services requires more than passwords and legacy security approaches that aren’t designed for the mobile-cloud world.
Tags : 
    
MobileIron
Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q119
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions
Published By: Adobe     Published Date: Nov 02, 2018
Improving the customer experience is a strategic imperative for most organizations today, but delivering an engaging experience across the growing number of digital customer touch points can be a daunting challenge. Organizations must deliver responsive experiences that “play well” on smartphones, PCs, and tablets. They must publish content to installed app experiences on mobile and other connected devices, to social channels, and to email campaigns. They must manage global sites in different languages, localize the experience for different markets, and — increasingly — personalize the experience for different customer personas or segments. A modern digital experience management platform is essential for any organization hoping to make digital experience delivery a core competency. IDC interviewed organizations using Adobe Experience Manager Sites (AEM Sites) to understand the impact of the platform on their ability to create, manage, and deliver digital experiences. Study participants
Tags : 
    
Adobe
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management. As we receive inquiry on this area increasingly, it makes sense to assess this market.
Tags : 
    
CA Technologies EMEA
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.