devices

Results 1 - 25 of 1766Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Jul 17, 2019
Managing a large, diverse, and geographically dispersed fleet of client systems can be complex and time-consuming. With the increasing prevalence of smart, connected devices that are beginning to appear within the enterprise across industries, technology service organizations will face an explosive demand for a consistent approach to device management and security. Using Intel AMT, service organizations can take simple and effective steps to enable more manageable client systems. They can streamline operations and create a consistent approach to managing a broad spectrum of devices. Powerful platform capabilities can help service organizations meet user needs, minimize downtime, and safeguard the enterprise. Service organizations can draw upon available solution reference architectures, implementation guides, and readily available tools from Intel and others to successfully activate Intel AMT and begin to realize its major benefits.
Tags : 
    
Intel
Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why it’s harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovo’s ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
    
Lenovo - APAC
Published By: ETQ     Published Date: Jul 10, 2019
The FDA has announced plans to transition to standard ISO 13485:2016 for medical devices in 2019. In addition, the Medical Device Single Audit Program, MDSAP, has gained traction with full implementation set for 2019. Download this paper to learn more about these two changes from the U.S. Food and Drug Administration’s proposal to harmonize and modernize its Quality System Regulation (QSR).
Tags : 
    
ETQ
Published By: Flexential     Published Date: Jul 17, 2019
By 2020, there will be 50 billion devices producing 600Zb of data, driving enterprises to assess their IT infrastructures to keep pace with unprecedented data processing demands. Is your business ready to handle this data explosion? In this on-demand webinar, you’ll hear Tim Parker, Vice President of Network Services at Flexential, and Craig Matsumoto, Senior Analyst of Data Center Services at 451 Research, discuss the evolution of data – and how enterprises are processing and creating it. Download now to hear Parker and Matsumoto examine how edge computing solutions are meeting the latency demands of an increasingly digitized world.
Tags : 
    
Flexential
Published By: Flexential     Published Date: Jul 17, 2019
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question.
Tags : 
    
Flexential
Published By: Jamf     Published Date: Aug 06, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
    
Jamf
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
You may have heard that storing device data for more than a few months has no value because fraudsters frequently switch devices. Our data shows otherwise. Over a typical 30-day period, iovation saw 2M transactions from devices with a history of fraud that was first seen on our network 3+ years earlier. That number is even more sobering for devices first seen 1-2 years earlier: 16M transactions. Fortunately, iovation’s unique device history capability provides our customers with the knowledge of whether a device has a history of fraud.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing
    
Coyote Point Systems
Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks
Published By: VMware     Published Date: Aug 16, 2019
Many IT departments are faced with the challenge of unifying endpoint management and Windows 10 desktops. Download this eBook to learn how your organization can excel with a modern approach to PC management by leveraging Windows 10 features to streamline the management of both PCs and mobile devices.
Tags : 
    
VMware
Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra
Published By: ASG Software Solutions     Published Date: May 12, 2010
For many organizations, managing and delivering the knowledge contained within documents is difficult or impossible due to technological disparity. Conventional approaches to knowledge management work within the constraints of disparate platforms, applications, and output devices, and fail to address technological disparity.
Tags : 
asg, cypress, managing delivery, knowledge management, document management, collaboration, collaborative commerce, contact management
    
ASG Software Solutions
Published By: ExpertVoice     Published Date: Jun 20, 2019
Are we in the midst of a retail apocalypse? In spite of doomsday headlines, brands that focus on the customer experience continue to succeed. A good retail experience can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, only 35% of retail employees feel as though training is effective. That’s a scary number, because without a well-trained retail sales force, consumers are left to their own devices.
Tags : 
    
ExpertVoice
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Published By: Dell APAC     Published Date: May 16, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.