eMarketingPapers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

mobile access

Results 151 - 175 of 398Sort Results By: Published Date | Title | Company Name
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync está cambiando la estructura de costes en la telefonía empresarial y está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva. Aquí tiene 10 consejos para asegurarse de que Lync funciona bien en los dispositivos móviles en la red. Microsoft Lync no sólo está cambiando la estructura de costes en la telefonía empresarial sino que, además, está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sarà tutto concentrato sulla mobilità. Già nel 2013 nel mondo ci sono più dispositivi mobili che persone, e l'IT deve fornire una connettività senza interruzioni ad ogni tipo di utente — dipendenti, appaltatori, ospiti e persino clienti — che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E così, la mobilità sul posto di lavoro non giova solo agli utenti e alla produttività. La migrazione verso la mobilità genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync cambia la struttura dei costi della telefonia aziendale e apre la strada ad una nuova esperienza per il cliente, in cui ogni comunicazione si trasforma in un'interazione più collaborativa e coinvolgente. Ecco 10 consigli per garantire il corretto funzionamento di Lync sui dispositivi mobili della vostra rete.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Box     Published Date: Jun 11, 2014
A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Here’s how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.
Tags : 
box, mobile, progressive, access, wireless, business technology
    
Box
Published By: Box     Published Date: Jun 19, 2014
This AIIM Trendscape report has in-depth interviews of 50 senior end users and industry leaders, highlights expert recommendations to maximize mobile opportunities within the enterprise and offers a 7-point mobile action plan that organizations can execute in the next 12 months. Obtain access to data, expert opinions and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing issues that are not readily apparent in existing coverage about mobile technologies.
Tags : 
box, aiim, mobile opportunities, mobile first, mobile technologies, applications, it management, enterprise applications
    
Box
Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data, it management
    
Gigya
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: Looker EMEA     Published Date: Sep 27, 2017
Want to know how Business Intelligence products vary in categories such as scalability, reliability, technical support, value for price paid, integrity, and whether the vendor is recommended? Read this report to get: • A side-by-side comparison of 28 BI tools • Ratings across 33 metrics for each vendor • Real customer feedback on performance
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Looker EMEA
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
    
F5 Networks Inc
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
    
Cherwell Software
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue. Think of all the passwords you keep track of for your personal needs—your mobile banking app, your Gmail, your Facebook account, your Amazon Prime… the list goes on. Best practices tell us that we should use a unique and complex password for every service, but due to increased cloud adoption—enabling anytime access to applications from any device—users lean toward convenient but risky password practices.
Tags : 
    
F5 Networks Inc
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact
Published By: ClickExpress     Published Date: May 01, 2013
Download this white paper to gain insight from the research firm IDC which predicts that some 1.2 billion workers will be using mobile enterprise tools by 2011, representing roughly a third of the total global workforce (February 2010). Some of these people are almost exclusively mobile, whereas some will only occasionally use mobile enterprise tools. Whatever the case, there are very few who would argue against the fact that investing in mobility has the potential to raise productivity, accessibility and visibility.
Tags : 
mobile, solution, deploy, enterprise, global workforce, scalability, integration, device selection, wireless communication
    
ClickExpress
Published By: Return Path     Published Date: Jan 29, 2013
Email marketing is always changing. Download the “Email Intelligence Report” to tap into the latest data trends and analytics to optimize your email campaigns and ROI.
Tags : 
email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends, email marketing best practices, mobile best practices, customer experience/engagement, e-commerce solutions
    
Return Path
Published By: Return Path     Published Date: Jan 31, 2013
Email marketing isn’t simple anymore. The “Email Best Practices for Mobile” podcast provides best practices and tips for marketers designing email content for both mobile and desktop viewing.
Tags : 
email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends, email marketing best practices, mobile best practices, email marketing services/software, mobile marketing
    
Return Path
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : 
microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications
    
Microsoft Windows Phone
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses how mobile devices accessing enterprise data can pose security risks.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, malware, mobile antivirus, data encryption, ibm
    
PC Mall
Published By: MicroStrategy     Published Date: Mar 16, 2011
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple's mobile devices.
Tags : 
microstrategy, mobile business intelligence, bi application, security, data access, apple mobile device, data transmission, data storage, data protection
    
MicroStrategy
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library