mobile solutions

Results 76 - 100 of 331Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Mar 28, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization Helps manufacturers establish more accurate supply chain ETAs Utilizes a range of technologies to provide real-time locations both indoor and outdoor
Tags : 
location data, mapping, here technologies
    
HERE Technologies
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in todays digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, anti spam, authentication, disaster recovery, encryption, firewalls, hacker detection
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, anti spam, anti spyware, anti virus, ddos, disaster recovery, encryption
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, anti spam, anti spyware, anti virus, compliance, ddos, disaster recovery
    
HP - Enterprise
Published By: NetApp     Published Date: Sep 24, 2013
"Today, enormous amounts of data are being created from a variety of sources, such as applications, new mobile devices, big data analytics, and the cloud. This is changing the speed with which business gets conducted and the scale in which it occurs. Moreover, the digital explosion shows no sign of slowing and IDC expects the amount of data being stored to grow in excess of 50% per year over the next few years. Discover how flash technology is being deployed to improve performance and efficiency for these demanding environments. Access this IDC whitepaper to learn more about the role of flash technology and the importance of flash solutions that are designed specifically for the enterprise."
Tags : 
data, cloud, data centers, mobile devices, flash technology, flash solutions, netapp, enterprise applications, storage, data management, data center
    
NetApp
Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote, wireless, enterprise applications
    
Keynote
Published By: Jamf     Published Date: Jan 18, 2018
Ace your migration with a manageable timeline. Once the decision is made to switch MDM solutions, the first step is to construct a logical, achievable timeline. The timeline should include critical milestones, financial considerations, school breaks, or any other factors that may impact implementation success. Choose a time when devices can be out of use in order to give IT time to make the transition without impacting users. Download this whitepaper to learn more!
Tags : 
    
Jamf
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Lookout     Published Date: Dec 09, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Over the past year, Gartner has provided important observations and guidance on Enterprise Mobility Management (EMM) and mobile security solutions. Read the report for key insights into the differences between the two as well as to better understand current state of mobile threat defense.
Tags : 
gartner, market, insights, mobile threat, emm, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
webinar, mobile security, ciso, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In this eBook, youll learn about the difference between securing mobility and mobile security, why EMM/MDM solutions alone arent security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
mobile security, device security, device attacks, enterprise mobile security
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In todays Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions.This whitepaper highlights some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
mobile threats, mobile security, mobile protection, enterprise mobility management, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of todays mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.