Skip to main content
 

enterprise device

Results 251 - 275 of 406Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 31, 2018
In this panel discussion, AWS will join APN IoT Competency Partners, Bsquare (device management software and services), Eseye (global cellular connectivity), and Intel (edge-to-cloud IoT platform spanning sensors, processors, IoT gateways), and cloud infrastructure, for a conversation about the challenges and opportunities of device management. Find out how enterprises can accelerate time to business value with an integrated and fully-managed approach to their connected devices.
Tags : 
aws, iot, device, management, aws
    
AWS
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Enterprise conferencing and collaboration technologies today stand at an exciting crossroads. Solutions that were once considered consumer technologies are moving into the enterprise. Never has this trend been more pronounced than now, as consumerization of IT and mobile device proliferation increasingly break down the walls between business and consumer use. As a result, enterprise solutions must become increasingly simpler to deploy and more intuitive to use. At the same time they must deliver a secure and seamless communications experience. As the worlds of consumer and business communications blend, walking the line between the two has become top of mind for users and IT decision makers alike. Businesses must capitalize on these tectonic shifts in user preferences by deploying agile communications that today’s mobile users need in order to collaborate effectively wherever they are.
Tags : 
continuous communication, consumer technologies, mobile device proliferation
    
8x8 Inc.
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. Read on to learn what ESG has to say about Dedupe 2.0 and what's in store.
Tags : 
dedupe 2.0, backup server, data infrastructure, backup server, data transmission
    
Sponsored by HP and Intel®
Published By: VMware AirWatch     Published Date: May 18, 2016
Read this infographic to learn how EMM (Enterprise Mobility Management) empowers mobile users in becoming more productive.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 19, 2016
The mobile office is a reality in today’s world. According to the Philadelphia Business Journal, telecommuting has increased more than 73 percent since 2005, meaning a burgeoning number of employees are accessing corporate documents and data on their mobile devices. In a recent IDG Enterprise survey, 82 percent of respondents reported that at least some colleagues have completed tasks from mobile devices, whether those devices are managed or not.
Tags : 
technology, telecommuting, mobile data, mobile workforce, best practices
    
VMware AirWatch
Published By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : 
contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t
    
AT&T
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing
    
Aerohive
Published By: Schneider Electric     Published Date: Dec 29, 2011
The rapid growth of consumer smartphones and tablets is having a dramatic impact on the enterprise. For employees, it's all about choice and convenience, but for organizations, it introduces new challenges and risks. Companies of all sizes are struggling with an ever-growing array of IT management and security concerns, as more and more business data moves to mobile devices. In this program, we address these concerns and reveal the secrets to unlock the power of mobility with two of the leading experts in the industry.
Tags : 
    
Schneider Electric
Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency
    
Intralinks
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users
    
Intralinks
Published By: Box     Published Date: Nov 09, 2014
Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.
Tags : 
box, file sharing, content sharing, mobile workers, collaboration, cloud file sharing
    
Box
Published By: Box     Published Date: Nov 09, 2014
Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.
Tags : 
box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers
    
Box
Published By: IBM MaaS360     Published Date: Sep 30, 2014
Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.
Tags : 
mobile device management, mobility, enterprise mobility, mobile security, application management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : 
maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile, emm, mobile management strategy, mobile device management
    
IBM MaaS360
Published By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service
    
BubblewrApp
Published By: Honeywell     Published Date: Feb 18, 2016
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, honeywell enterprise mobility, mobility, enterprise mobility, mobile strategy, mobile management
    
Honeywell
Published By: Zebra Technologies (Bulldog)     Published Date: Sep 19, 2016
In this whitepaper we discuss the reasons for app migration, the process organizations need to go through, the choices they need to make and the ways to successfully navigate through the process.
Tags : 
mobile apps, zebra technology, next generation platforms, modern enterprise, mobile devices
    
Zebra Technologies (Bulldog)
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.