"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Mobile Workers

Results 326 - 350 of 576Sort Results By: Published Date | Title | Company Name
White Paper Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests
    
AppSense
Case Study Published By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : 
case study, web security, cloud, mobility, mobile security
    
Webroot
White Paper Published By: Webroot     Published Date: Nov 02, 2012
These days, fixing your endpoint security software requires a new approach and it's called "forget the old approach". Download this white paper to learn more.
Tags : 
it security, endpoint security, endpoint protection, security software, security
    
Webroot
Case Study Published By: Box     Published Date: Oct 18, 2012
A modern mobile IT strategy is no longer an option, it is an absolute business necessity
Tags : 
box, mobile it strategy, bring your own device, mobile file sharing, collaboration
    
Box
White Paper Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Download this whitepaper to learn 11 ways that you can leverage remote agents.
Tags : 
remote agents, home agents, customer experience, customer contact, contact centers
    
Interactive Intelligence
White Paper Published By: Lenovo     Published Date: Sep 11, 2012
Discover why IT Managers are recommending Lenovo's ThinkPad Carbon as an essential tool for a busy workforce that's always on the go.
Tags : 
macbook air, apple, ibm, lenovo, carbon fiber
    
Lenovo
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise
    
ForeScout
Webinar Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel
    
Intel
Webinar Published By: Intel     Published Date: Aug 10, 2012
See why 3rd generation Intel® CoreT vProT processors are ideal for Windows 7 security in your demanding and fast moving business environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel
    
Intel
Webinar Published By: Intel     Published Date: Aug 10, 2012
What is Intel® CoreT vProT technology? Learn about the security and manageability features that deliver a secure and efficient IT environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel
    
Intel
White Paper Published By: IBM     Published Date: Aug 08, 2012
Read this white paper to learn how marketers are using IBM technology to learn about their customers' attitudes, preferences and buying habits from what they say on publicly available social media and through the full range of interactions that can be recorded, measured and analyzed. Discover how marketers are combining that knowledge with other sources of customer information to guide marketing decisions and shape marketing campaigns, cultivating relationships with online advocates to help steer product development, and, ultimately, boosting sales and revenue.
Tags : 
paid media, owned media, earned media, social media, ibm
    
IBM
White Paper Published By: Blue Coat Systems     Published Date: Aug 07, 2012
For anywhere, anytime, any-device mobile engagement, implementing a stateless architecture calls for building protection in the application layer, moving from device management to risk-based device inspection, performing real-time threat detection and mitigation, and leveraging cloud technologies.
Tags : 
mobility, it security, security & risk, s&r, infrastructure operations
    
Blue Coat Systems
White Paper Published By: Epicor     Published Date: Aug 03, 2012
Do you cringe at the thought of having to replace your enterprise software solution? Does it seem like a monumental undertaking, with a high risk of failure?
Tags : 
cloud computing, software solutions, distributors, marketing groups, rfp
    
Epicor
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg
    
CDW Symantec
White Paper Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue
    
Aternity
White Paper Published By: SAP     Published Date: Jul 18, 2012
Mobile is not simply another device for IT to support with a shrunken Website or a screen-scraped SAP application. Rather, mobile manifests a broader shift to new engagement systems. CIOs must plan now for them and empower customers, partners, and employees with context-aware apps and smart products.
Tags : 
technology, mobile, apps, applications, cio
    
SAP
White Paper Published By: GlobalSCAPE     Published Date: Jul 16, 2012
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks.
Tags : 
globalscape, mobile devices, mobile security, file sharing, mobile workers
    
GlobalSCAPE
White Paper Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage
    
Box
Webinar Published By: IBM     Published Date: May 30, 2012
Learn how CPG and Wholesale Distributors are becoming more efficient, more innovative, more agile, and more competitive.
Tags : 
cpg, wholeshale, real time, plant floor, retail
    
IBM
White Paper Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy
    
Cisco
White Paper Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec
    
PC Mall
White Paper Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management
    
PC Mall
White Paper Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses how mobile devices accessing enterprise data can pose security risks.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, malware
    
PC Mall
White Paper Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security
    
ZScaler
White Paper Published By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : 
mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery
    
Cotendo
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory