mobile data

Results 1 - 25 of 666Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Todays organizations turn to the cloud for all types of productivity-gaining tools including security. Features such as security for mobile users and data loss protection are key, but its also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Todays employees are mobile, theyre storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: Automate policy enforcement to deter data loss events Reduce the number of security alerts Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Todays organizations turn to the cloud for all types of productivity-gaining tools including security. Features such as security for mobile users and data loss protection are key, but its also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Todays organizations turn to the cloud for all types of productivity-gaining tools including security. Features such as security for mobile users and data loss protection are key, but its also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Here Technologies     Published Date: May 14, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEMs brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, theyll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson, IBM MaaS360 UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in governments expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: HERE Technologies     Published Date: Apr 04, 2019
Artificial Intelligence (AI) has already begun to improve targeting, segmentation, media buying and planning in the advertising industry. AI algorithms can extract complex patterns from vast numbers of data points, and in so doing, are able to self-correct and learn patterns. The revenue potential that improved personalization, segmentation and targeting that AI provides to marketers is huge. At HERE Technologies, we are placing AI and machine learning at the center of our products and services. We see the opportunity in automated machine learning to enrich the targeting and effectiveness of mobile advertising campaigns in real time. But the outcome of implementing such technology depends on the quality of data being fed into it from the outset. AI wouldnt be as helpful if its being used alongside questionable location data or audience data. HEREs location data provides a strong thread that can be woven throughout every stage of the media buying process, offering more context and
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
In the future, people wont necessarily want to own cars, but theyll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: HERE Technologies     Published Date: Mar 25, 2019
In the future, people wont necessarily want to own cars, but theyll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
HERE Technologies
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices Its hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
At IBM Watson Marketing, we believe deeply in this practice and have dedicated a large effort to provide some of this critical data to marketers. The newest IBM Watson Marketing annual report of marketing benchmarks is bigger and better than ever with mobile marketing metrics data in addition to email marketing metrics. This years report includes traditional benchmark metrics such as email marketing open, click-through and unsubscribe rates, as well as email client and device data and engagement/read rates. New this year to the report are delivery and message frequency metrics for SMS and open and clickthrough rates for mobile push messages.
Tags : 
    
Group M_IBM Q119
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial dataand hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized usersnot hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. Its now so integrated into IT and infrastructures that, for many companies, its simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Comcast Business     Published Date: Feb 06, 2019
Just like your business, technology never stops advancing. Each year, there are new ways that technology can automate processes, lower costs, and enhance customer and employee satisfaction - all with the goal of increasing revenue! And while it can be difficult to change how your business works, leaving old methods behind and embracing new technology can help lead your business to more success and growth.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent fast casual restaurants, match todays on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
restaurants, quick-serve restaurants, qsr, fast food, convenience food, restaurant technology, qsr technology, guest experience, pos, digital entertainment, wifi, television, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brands reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Todays travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotels app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
Retail has been transformed by technology in multiple ways, from the way customers interact with retailers to how products are offered and acquired. Indeed, the entire shopping experience has been redefined and expanded to enable customers to purchase products anytime, anywhere, with any device, from any number of retailers. Consumers changing shopping behaviors and their reliance on technology enables retailers to reach a wider swath of potential buyers, moving well beyond the borders of their physical store locations to new geographies and populations. That said, retailers must understand how to use technology effectively to draw in customers and entice them to purchase, as well as help them improve their operations and enable new, innovative ways to keep customers coming back.
Tags : 
retail, shopping, retailers, wifi, retail technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking
    
Comcast Business
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.