devices control

Results 51 - 75 of 88Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Sep 12, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell
Published By: Cisco     Published Date: Jul 11, 2016
IoT impacts every business. Mobile and the Internet of Things will change the types of devices that connect into a company’s systems. These newly connected devices will produce new types of data. The Internet of Things will help a business gain efficiencies, harness intelligence from a wide range of equipment, improve operations and increase customer satisfaction. IoT will also have a profound impact on people’s lives. It will improve public safety, transportation and healthcare with better information and faster communications of this information. While there are many ways that the Internet of Things could impact society and business, there are at least three major benefits of IOT that will impact every business, which include: communication, control and cost savings. Read to learn more!
Tags : 
    
Cisco
Published By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity, access control, anti spam, anti spyware, anti virus, application security, auditing, compliance, security management, security policies, application integration, business activity monitoring, vulnerability management
    
Lumension
Published By: Apple Corporation     Published Date: Jan 16, 2014
iPad is changing the way companies across the globe use mobile devices for work. The Wi-Fi + cellular connectivity and 10-hour battery life of iPad help you stay connected all day long. iPad allows you to present with high impact in any situation, whether it is a sales meeting or presentation to a large audience. See how keynote can be used to create or edit presentations and learn how to use airplay mirroring, control your presentations and view important meeting notes. You will also see how customers are using iPad to mobilize their business. There will also be a Q&A segment where viewer questions will be answered by Apple Business Experts skilled in iPad integration and deployment.
Tags : 
apple, free online seminar, applications, presentations, high impact, it management, knowledge management
    
Apple Corporation
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Giving employees the right tools to do their best work can be challenging in today’s world of multiple devices and diverse work styles. This e-book reveals how to choose technology that helps your workforce: Protect company data Get more done Collaborate with colleagues Stay in control of their schedules Spend more time on value-added tasks
Tags : 
    
Microsoft Office 365
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
    
Intralinks
Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks
Published By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : 
cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks, mobile devices, network building, networking, wireless, enterprise applications, storage management, storage virtualization, application security, encryption, network security appliance, security management, web service security
    
Cisco Systems
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Today’s workforce accesses corporate content from the office, home, and everywhere in between. They utilize non-Windows devices including iOS, Android and Mac, and demand that IT support the specialized apps they need to get the job done. Savvy organizations have embraced desktop and application virtualization to meet these demands. Download this asset to learn how Horizon Cloud with on-premises infrastructure represents a new approach to building, delivering and managing virtual workspaces. This radically simple and scalable service unifies the management of on-premises virtual workspace services (desktops and applications) through a centralized cloud control plane, enabling delivery of virtual desktops and apps for as little as $0.50/user.
Tags : 
    
VMware AirWatch
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation
Published By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : 
discover, classify, endpoints, miercom, byod, iot
    
ForeScout
Published By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : 
forescout, risk, report, hackable, enterprise
    
ForeScout
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM     Published Date: Jan 05, 2015
As the number of connected devices grows from billions to hundreds of billions, and as governments and corporations race to take control of devices and data, we need to save the Internet of Things (IoT). Successfully scaling the IoT means executives must rethink the technology strategy.
Tags : 
it strategy, modern computing, iot, cost of computing, it management, knowledge management, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management, mobile data systems, mobile workers, wireless hardware, wireless infrastructure
    
Cisco
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management, application security, mobile computing, mobile data systems, smart phones, wireless application software, application integration, application performance management
    
VMware AirWatch
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: Citrix     Published Date: Jul 25, 2014
Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.
Tags : 
blackberry, byod, citrix xenmobile, control, security, mobile computing, mobile workers, smart phones, wireless communications, wireless phones, wireless security, collaboration, productivity
    
Citrix
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware
Start   Previous    1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.