consumerization

Results 1 - 25 of 83Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Enterprise conferencing and collaboration technologies today stand at an exciting crossroads. Solutions that were once considered consumer technologies are moving into the enterprise. Never has this trend been more pronounced than now, as consumerization of IT and mobile device proliferation increasingly break down the walls between business and consumer use. As a result, enterprise solutions must become increasingly simpler to deploy and more intuitive to use. At the same time they must deliver a secure and seamless communications experience. As the worlds of consumer and business communications blend, walking the line between the two has become top of mind for users and IT decision makers alike. Businesses must capitalize on these tectonic shifts in user preferences by deploying agile communications that todays mobile users need in order to collaborate effectively wherever they are.
Tags : 
continuous communication, consumer technologies, mobile device proliferation
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
In todays highly competitive business environment, top companies will be the ones that have developed innovative ways to create stellar communications experiences that keep the end users engagedemployees and customers alike. Video and Web conferencing have become well-established tools to drive rich internal as well as external communications. However, to make an impact, these collaboration tools must be reliable and intuitive to use. Continuous communication offers hassle-free integrated user experiences that fit todays mobile work styles. Technology advancements and changing perceptions are opening up innovative opportunities, which offer businesses new avenues to create a competitive edge. Smart companies must catch on or get left behind.
Tags : 
market shaping trends, consumerization, user-driven it, web conferencing, solution spotlight, 8x8 virtual office meetings, use cases, customer examples
    
8x8 Inc.
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage, web services, web service security, application integration, data protection, web service management, software compliance
    
Aberdeen - youSENDit
Published By: Aberdeen Group     Published Date: Sep 06, 2011
This Aberdeen Group research shows why you should be looking more closely right now at secure/managed file transfer solutions.
Tags : 
aberdeen, secure / managed file transfer, file transfer, collaboration, copy and carry, ftp, dropbox, sftp, ftps, smft, enterprise data, velocity, consumerization, complexity, digital diy, infrastructure, network attached storage, storage management, business intelligence, data integration
    
Aberdeen Group
Published By: Absolute Software     Published Date: Dec 20, 2012
This IDC document presents highlights from the Adopting Mobility in the Enterprise Executive Roundtable held in New York City.
Tags : 
security, mobile, cloud, tablet, consumerization
    
Absolute Software
Published By: Aerohive     Published Date: Oct 01, 2012
Best Practices to prepare your WLAN for BYOD and the Consumerization of IT
Tags : 
aerohive, free, webinar, cio, byod, wlan, consumerization
    
Aerohive
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The consumerization of technology and rise of mobile adoption in emerging and established markets have driven companies to invest enormous capital and resources into pursuing the best possible mobile experience for all of their end users. But, without a focused mobile performance solution, these investments can only go so far. Download now to learn more
Tags : 
mobile experience, branding, akamai, loyalty
    
Akamai Technologies
Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise what many are calling the "consumerization of IT" and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks
Published By: BlackBerry     Published Date: Mar 12, 2013
Find out about the challenges companies are encountering in the face of the four Cs: Compliance, Control, Cost and Consumerization. And, learn what businesses can glean from the public sector about best-practice Enterprise Mobility Management (EMM).
Tags : 
tco, security, enterprise grade mobility, emm, blackberry 10, best practices, knowledge management, enterprise applications, mobile computing, mobile data systems, wireless communications
    
BlackBerry
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, it management, knowledge management, enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Exploring Business and IT Friction: Myths and Realities, outlines key issues that cause friction between business users and IT, such as: Gaps in customer satisfaction and the perceived value of services Inadequate IT support, which decreases productivity and revenue Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, it management, knowledge management, enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Aug 18, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations.
Tags : 
consumerization, enterprise, it service, best practices, it management
    
BMC Software
Published By: Box     Published Date: Nov 28, 2012
End users need the right tools for document collaboration, and in the era of consumerization, they'll find them... with or without you!
Tags : 
cloud, cloud file sharing, cloud file sharing vendors, cloud vendors, dropbox, box, google drive, files sharing, wireless, collaboration
    
Box
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 13, 2015
Organizations are managing a rapidly escalating number of projects due in large part to the consumerization of IT. As a result, you face growing demands for mobile technology-based apps and services on top of your backlog of already ongoing strategic initiatives. And when priorities keep changing, functioning effectively is difficult without Project and Portfolio Management (PPM) tools that support your need for additional oversight, better decision-making and more efficient use of resources.
Tags : 
portfolio management, mobile technology, project management, consumerization, decision making
    
CA Technologies
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed securely.
Tags : 
consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios, android, access mobile applications, mobile device, mobile management, byod, wireless, network management, network performance management, productivity, mobileiron
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with and in many cases surpassing PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless, data management
    
CDW
Published By: Centrix Software     Published Date: Mar 19, 2014
A case study on how consumerization drives AstraZeneca to use workspace management for cloud-first collaborative end-user solutions
Tags : 
it management, application integration, application performance management, workforce management
    
Centrix Software
Published By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices, secure instant messaging, mobile computing, mobile data systems, smart phones, wireless application software, wireless messaging, application integration, workforce management, microsoft exchange, windows server, content delivery
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
mobile, enterprise, application gap, pcs, byod, data, networking
    
Citrix
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.