Skip to main content
 

manage devices

Results 201 - 225 of 300Sort Results By: Published Date | Title | Company Name
Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Apple Corporation     Published Date: Mar 26, 2014
Join Apple Business Experts for a exclusive on-demand online seminar to learn what’s new in iOS7 for business. Learn how iOS and an ever-expanding collection of features and built-in apps make iPhone and iPad even more powerful, innovative, and enjoyable to use for work. You will also see how iOS provides IT with powerful, yet simple ways to deploy and manage iOS devices, secure corporate data, and enable a great user experience. Register Now!
Tags : 
apple, ios7, iphone, ipad, business solutions, it solutions, it management
    
Apple Corporation
Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management
    
ForgeRock
Published By: Microsoft Nokia Lumia     Published Date: Jun 08, 2016
Organizations' users increasingly depend on their mobile devices, but phones and tablets bring new and unfamiliar challenges for IT departments. IT must be able to deploy and manage mobile devices and apps quickly to support the business while balancing the growing need to protect corporate data because of evolving laws, regulations, and cybercrime.
Tags : 
    
Microsoft Nokia Lumia
Published By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : 
discover, classify, endpoints, miercom, byod, iot
    
ForeScout
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, retail
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.
Tags : 
enterprise mobility management, technology roadmap, mobile devices
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
ibm, retail, mobile device management, data security, android, apple, mobile
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
ibm, mobile, content management, mcm, aragon research
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
The Big Bang Theory – how Mobile Device Management exploded to include devices, apps and content
Tags : 
ibm, mobile, enterprise mobility management, mobile device management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
Tags : 
ibm, gartner, mobile, enterprise mobility, enterprise mobility management suites
    
IBM MaaS360
Published By: IBM     Published Date: Jan 07, 2016
Are you suffering from “mobilephobia”? If you’re a CISO, and the growing number of mobile devices on your network—and your inability to manage those devices with traditional security measures—keeps you awake at night, then you’ve got a textbook case of mobilephobia.
Tags : 
ibm, mobile, ciso, mobile, security
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You might be wondering how things could get so complicated so quickly. But as an IT professional, you are nodding your head, because it all sounds very familiar. More Users + More Devices = More Complexity
Tags : 
    
Cisco
Published By: Xora, A ClickSoftware Company     Published Date: May 20, 2014
Discover what features mid-market businesses must evaluate when selecting a MWM solution
Tags : 
xora, mid market business, mobile workforce managements, mwm, mobile phones, smart phones, tablets, mobile devices
    
Xora, A ClickSoftware Company
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Our services can help you create a robust mobile environment where you can deploy and manage devices and applications more easily.
Tags : 
manage mobiles, mobile services, managing mobile services, global enterprise, services globally, manage devices, manage applications, mobile environment, deploy devices, emerging mobile market, robust mobility
    
IBM
Published By: Oracle     Published Date: Nov 13, 2013
This Executive Brief explores the role of service and support in creating great customer experiences, the service goals market leaders use related to customer experience, the Oracle approach for empowering new service experiences, and how Oracle’s service solutions can help organizations create and manage their own great customer experiences across all channels, touchpoints, and devices.
Tags : 
zenithoptimedia, oracle, executive strategy series, customer experience, empowering people, take initiative, power your brand, oracle service solutions, customer experience impact, cei, service and support experience, lasting customer relationships, sales interactions, ignored customers, efficiency, acquisition, improve self-service, improve productivity, cross-channel support, decrease operational costs
    
Oracle
Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software
    
IBM
Published By: VMware AirWatch     Published Date: Sep 16, 2015
This whitepaper shows how AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 APIs and VMware Identity Manager, or your on-premise identity management or cloud, to optimize UX and ensure your data is secure across all devices and platforms.
Tags : 
airwatch, emm, office365, cloud
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.