mobile network

Results 1 - 25 of 315Sort Results By: Published Date | Title | Company Name
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in governments expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Comcast Business     Published Date: Feb 06, 2019
Just like your business, technology never stops advancing. Each year, there are new ways that technology can automate processes, lower costs, and enhance customer and employee satisfaction - all with the goal of increasing revenue! And while it can be difficult to change how your business works, leaving old methods behind and embracing new technology can help lead your business to more success and growth.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Enterprises are looking to innovations like big data, cloud-based services and mobile apps to improve decision making and accelerate business results. But legacy IT implementationsindependent compute, storage and networking platforms, veneered with a hypervisor often cant deliver on the increased agility, scalability and price performance demands of this new era of IT.
Tags : 
information technology, networking platforms, return on investment, cloud-based services, mobile apps
    
Hewlett Packard Enterprise
Published By: Zoom     Published Date: May 15, 2015
This is a case study about a proactive approach to protect mobile devices and networks for individuals, businesses and governments.
Tags : 
    
Zoom
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in todays idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products werent built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation, business integration
    
Hewlett Packard Enterprise
Published By: Samsung     Published Date: Dec 18, 2015
Download this infographic to see why with increasing adoption of mobile banking, banks must take a mobile-first approach to their branch networks
Tags : 
    
Samsung
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco WebEx, Cisco Spark, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 18, 2015
This paper illustrates how organisations are becoming digital enterprises due to the technology implications of scale and volume.
Tags : 
technology, digital economy, network, become a digital enterprise, mobile, social, cloud, big data
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
Changes in where traffic originates and how much data is generated will soon have profound effects on Internet latency and end-user quality of experience.
Tags : 
data, generate data, host applications, ensure optimal performance, devices, mobile data, mobility, data traffic
    
Equinix
Published By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in todays mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operators network planning and operations teams. Read to learn more.
Tags : 
    
Gigamon
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The challenges that IT security professionals face grow more complex daily: Cyberthreats are sophisticated and ever-evolving, the workforce is varied and mobile, and access to the corporate network must be customized and efficient.
Tags : 
    
Akamai Technologies
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Social, Mobile, Analytics and Cloud (SMAC), have broad potential to provide huge business value, while simultaneously presenting potentially overwhelming challenges. The rapid technology changes supporting SMAC and the overall complexity involved demand a systematic approach to building out your SMAC capability.
Tags : 
collaborative consulting, creating opportunities, driving disruption, social, mobile, analytics, cloud, infrastructure
    
Collaborative Consulting
Published By: HPE     Published Date: Mar 23, 2015
If youve noticed more employees accessing the corporate network using their personally owned mobile devices, youre not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organizations mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employees productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.
Tags : 
mobile productivity, mobile access, security, connectivity, byod, corporate network, networking, it management
    
PulseSecure
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aid liminer les vieux primtres rseau. La nouvelle entreprise ouverte doit faire avec un large ventail d'utilisateurs, d'appareils et d'applications, sans limites dfinies. De nouveaux modles de scurit sont essentiels pour la fois permettre et protger les activits commerciales dans ce monde nouveau. Tlchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security
    
CA Technologies
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless
    
Ruckus Wireless
Published By: MobileIron     Published Date: Apr 20, 2015
A case study of how MobileIron Core, App@Work, and app delivery network technologies have been leveraged to augment and support ShiSeiDo operations. Study is in Japanese.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
Angesichts der Geschwindigkeit, mit der Unternehmen auf Mobiltechnik umsteigen, muss man statt von einer Entwicklung schon eher von einem globalen Wandel sprechen. Unter Bercksichtigung der Tatsache, wie schnell Benutzer und Unternehmen von PCs auf Mobilgerte umsatteln, prognostizierte IDC, dass der Absatz von PCs 2013 auf ein Rekordtief fallen wrde.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
Diese Anleitung beschreibt nicht nur, wie Enterprise Mobility Management funktioniert, sondern zeigt auch an einem typischen Implementierungsbeispiel, wie ein Unternehmen die Einfhrung plant und alle Teile einer EMM-Lsung verwaltet. Diese Anleitung enthlt einen detaillierten Bereitstellungsprozess unter Verwertung der gesammelten Erfahrungen und Empfehlungen zur Suche nach dem richtigen EMM-Anbieter und Schritt fr Schritt umsetzbare Erkenntnisse aus der Praxis, die jedem Unternehmen bei der Umwandlung zum Mobile-First-Unternehmen helfen knnen.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
En plus de dcrire le fonctionnement de lEMM, ce guide livre galement une implmentation type en expliquant comment une organisation s'y prend pour dployer et grer tous les lments d'une solution EMM. En donnant un processus dtaill de dploiement des bonnes pratiques ainsi que des recommandations pour identifier le bon fournisseur EMM, ce guide propose des informations pratiques et des procdures qui permettront toute organisation d'acclrer la transition vers une entreprise Mobile First.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.