users

Results 1601 - 1625 of 1807Sort Results By: Published Date | Title | Company Name
Published By: LogMeIn     Published Date: Apr 17, 2015
This whitepaper provides information on how users are bringing their devices and applications to work for simpler, faster, and better ways to communicate and collaborate.
Tags : 
web conferencing trends, consumerization, convergence, byod, virtual conference, video conferencing, online conference, byoa, webinars & web conferencing
    
LogMeIn
Published By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : 
data, security, mobility, mobile computing, best practices
    
Absolute Software
Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 
123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: ESET     Published Date: Sep 07, 2011
We discuss about Internet users' behaviour when it comes to Internet security and the top ten threats of the month.
Tags : 
eset, threat report, internet security, malware industry, antivirus, cybercrime group, mobile devices
    
ESET
Published By: Globalscape     Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you’ll learn: - 3 layers most targeted: the network, data & users - Bad security practices - Why Managed File Transfer is a critical component to combat bad practices
Tags : 
globalscape, managed file tracker, data security, data breaches
    
Globalscape
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Published By: IBM     Published Date: Feb 26, 2016
Watson Engagement Advisor is transforming the way people and organizations interact with the latest evolution of self-service. Watson Engagement Advisor empowers users to get questions answered in the manner they like best.
Tags : 
watson engagement advisor, ibm, customer engagement, customer service, process automation
    
IBM
Published By: SAP     Published Date: Sep 19, 2017
SAP S/4HANA Retail for merchandise management is at the core of a comprehensive suite of retail offerings designed to help retailers meet the demands of a digital economy. It supports retail core processes end to end, starting with master data down to point-of-sales (POS) connectivity. It allows insights into operational retail data, empowering users with contextual, real time information for faster and better decision making. Processes can easily be extended to connect to business networks to form a digital ecosystem and collaboratively drive business model improvements. Equipped with a simple and intuitive user experience, the solution offers better support for headquarters users as well as store associates to drive compelling customer experiences.
Tags : 
master data, management, retail price, merchandise buying, collaboration, vendor agreement, forecasting, sap
    
SAP
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
In today’s highly competitive business environment, top companies will be the ones that have developed innovative ways to create stellar communications experiences that keep the end users engaged—employees and customers alike. Video and Web conferencing have become well-established tools to drive rich internal as well as external communications. However, to make an impact, these collaboration tools must be reliable and intuitive to use. Continuous communication offers hassle-free integrated user experiences that fit today’s mobile work styles. Technology advancements and changing perceptions are opening up innovative opportunities, which offer businesses new avenues to create a competitive edge. Smart companies must catch on or get left behind.
Tags : 
market shaping trends, consumerization, user-driven it, web conferencing, solution spotlight, 8x8 virtual office meetings, use cases, customer examples
    
8x8 Inc.
Published By: IBM APAC     Published Date: Jul 09, 2017
IT departments are under constant pressure to deliver improved user experiences that lead to revenue growth. Achieving this goal requires addressing multiple areas at once: taking advantage of the flexibility and scalability of the cloud; empowering mobile users with anytime, anywhere access; and accelerating digital transformation.
Tags : 
digital transformation, ecm, enterprise content management, cloud, flexibility
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
Published By: VMware AirWatch     Published Date: Nov 12, 2015
IT requires a solution that solves the challenge of securing proprietary applications and data in the cloud datacenter and is available only to users and devices that are delegated safe for access. VMware NSX solves this challenge through user-level micro-segmentation. The VMware NSX approach offers several differentiated advantages over traditional security approaches.
Tags : 
vmware, cloud datacenter security, mobility, smart networking, vmware nsx, micro segmentation
    
VMware AirWatch
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: May 19, 2016
We work at home. We take conference calls in the backseat of a taxi. We even tap out emails from 30,000 feet. Mobility is radically redefining the way we work, because it’s redefining where and when we can work. It’s why Keith Perske, executive managing director of workplace innovation for Collier’s, thinks it’s time to adopt a new description of the workplace: “Today’s workplace is an integrated set of locations, technology, programs and work practices that connect people and enable employees to contribute and be productive. That’s the new workplace definition.” And with the emergence of this modern workplace, users are expecting a mobile experience that’s simple, convenient, and a boon to their productivity. In order to deliver on these expectations, IT organizations are making business mobility a priority in their investment decisions. Which is why we’ve identified five potent mobility trends that warrant attention and also present opportunities to transform the enterprise
Tags : 
technology, innovation, work practices, best practices, mobility, trends
    
VMware AirWatch
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Tribold.com     Published Date: May 09, 2013
Tribold CPQ is a Configure Price Quote (CPQ) services engine that powers the front end of the Quoting and Order Capture process providing the backbone to intelligently guide users in selecting relevant products for requirements
Tags : 
tribold, configure price quote, free demo, tribold cpq, services engine, tribold cpq solution
    
Tribold.com
Published By: Tribold.com     Published Date: Jun 12, 2013
Tribold CPQ is a Configure Price Quote (CPQ) services engine that powers the front end of the Quoting and Order Capture process providing the backbone to intelligently guide users in selecting relevant products for requirements.
Tags : 
tribold, cpq, configure price quote, quote validation, product configuration
    
Tribold.com
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: IBM     Published Date: Jun 21, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 22 ratings and 21 in-depth user reviews of Cloudant on TrustRadius, the trusted user review site for business software. By crowd-sourcing user perspectives, we help you to get a true sense of the product. This report includes analysis of the types of customers (company sizes, industries etc.) that use Cloudant, what companies and users like most about the product, as well as areas for improvement
Tags : 
ibm, ibm cloudant, demographic, cloud computing, decision making
    
IBM
Published By: HP     Published Date: Nov 05, 2014
Webinar: Supporting users is more complex than ever. But now there’s a simple way to apply data and deliver service that’s truly amazing. Watch and see how it’s done.
Tags : 
itsm, itil, saas help desk, itil service desk, itil service management, itil change management, itil problem management, hp service anywhere
    
HP
Published By: Plantronics     Published Date: Oct 18, 2013
In the business world, the convergence of voice and data – as well as video and mobility – has evolved into unified communications, an enabler that is difficult to pigeonhole. Encompassing voice, data, video, mobility, and more, it can be located on site or it can be delivered/hosted from the “cloud”. Most important, UC ensures that information is available and people are reachable anytime, anywhere on almost any device of their choosing.
Tags : 
plantronics, uc solutions, end-users, communication integration, communication tools, collaborative processes, telecommuters, successful implementations, customer service, uc implementations, dimension data, international systems integrator, communication strategy, enhancing user productivity, strategic competencies, user-focus solutions, end-user acceptance, savvy integrators
    
Plantronics
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
    
Group M_IBM Q119
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.