ios

Results 351 - 375 of 915Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Mar 24, 2015
Decision makers at many organizations question the investments made in IT. This is often because they don’t fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. This often pressures CIOs to demonstrate the value of IT to the business. Learn how creating a great service catalog can help alleviate these pressures and why many consider it to be fundamental to any IT improvement initiative. An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
it visibility, it service management, compliance, it infrastructure, business services, it visibility
    
ServiceNow
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : 
    
ArborNetworks
Published By: Okta     Published Date: Jul 27, 2016
IT leaders at FICO, Rotary International, Informatica, and many other leading organizations are becoming strategic business enablers and creating new ways to engage customers and partners with Okta. Watch this short video to learn how these IT leaders are driving business results with Okta.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: SAP     Published Date: Jul 18, 2016
After Minnesota rolled out a cloud-based set of productivity tools that included instant messaging and video, growth among state agency users quadrupled and the number of cross-agency messages and videos increased by nearly 350,000 in just 2 years. There is a large-scale shift underway across the country where hardware infrastructure, platforms and software are being unbundled and moved out of government’s traditional area of operation. Download the thought leadership paper to learn more about what this shift entails, the benefits it will bring and how CIOs can prepare for its impact.
Tags : 
    
SAP
Published By: NetSuite     Published Date: Feb 17, 2016
Frost & Sullivan surveyed 1,500 senior executives (CEOs, CFOs, CIOs and other senior managers) in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US). Respondents spanned all major industry sectors, ranging from manufacturing to retail. The research shows that most executives not only agree that their industry is rapidly undergoing transformation, but that flexibility and adaptability are increasingly becoming key factors for survival.
Tags : 
industry change, retail, manufacturing, flexibility, adaptability
    
NetSuite
Published By: IBM     Published Date: Mar 29, 2017
This report details our findings about how well each vendor fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other. Forrester chose to evaluate the overall strategies of these providers across criteria like global footprint, service-level agreements, mobile support, enterprise readiness, and more. This report and associated Excel model highlight the key criteria CIOs and their staffs should evaluate when looking at prospective providers of online collaboration services. Download now to learn more!
Tags : 
forrester, cloud, online collaberation, it management, cloud strategies
    
IBM
Published By: IBM     Published Date: Oct 28, 2016
What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses? This is referred to as cognitive computing and is key to providing an analytics system that is easy to use but extremely powerful. Listen to this webinar, led by Jackie Ryan, the Director of Product Management for IBM's Smarter Workforce Portfolio, and learn about: The evolution of cognitive computing How cognitive computing transforms HR How to get started with cognitive talent analytics
Tags : 
ibm, kenexa, talent insights, talent analytics
    
IBM
Published By: OpenText     Published Date: Jun 28, 2019
According to Forrester, vendors that can make integration easier as well as provide a broad set of integration scenarios position themselves to successfully deliver in any public, private, hybrid and/or multi-cloud environment. Download the Forrester™ Wave report, Strategic iPaaS and Hybrid Integration Platforms, Q1, 2019, to discover the 15 integration solution providers that are most significant based on Forrester’s 25 criteria.
Tags : 
    
OpenText
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Compiling a cloud services comparison is a daunting task in the rapidlyevolving cloud environment. There are thousands of cloud services, dozens of cloud service providers, and numerous Infrastructure-as-aService (IaaS) providers offering pay-as-you-go pricing models—each one frequently changing and upgrading their portfolios. We have chosen to limit our cloud services comparison to the top three IaaS providers providing service in the Western Hemisphere—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—because, not only are these the IaaS providers most organizations are familiar with, they are also the IaaS providers whose services most organizations are likely to compare. This eBook provides an introduction to the range of services offered by the leading cloud service providers, information on regions and availability zones, a breakdown of cloud storage services, and more, to help inform you on your multicloud journey.
Tags : 
    
CloudHealth by VMware
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
The public cloud has rapidly moved past the novelty, curiosity stage to the business critical initiative stage for nearly every established organization. In a 2016 IDC CloudView survey, 80% of the enterprises contacted were actively engaged in public-cloud projects. The driving forces are a realization that the public cloud is “enterprise ready” and the need to be more agile, more responsive and more competitive. For those organizations that already have an existing physical IT infrastructure, the common starting point is a hybrid approach, which extends the existing data center into Microsoft® Azure™.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: IBM     Published Date: Jan 30, 2017
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, cognitive computing, analytics, engagement
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
This report details our findings about how well each vendor fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other. Forrester chose to evaluate the overall strategies of these providers across criteria like global footprint, service-level agreements, mobile support, enterprise readiness, and more. This report and associated Excel model highlight the key criteria CIOs and their staffs should evaluate when looking at prospective providers of online collaboration services. Download now to learn more!
Tags : 
forrester, cloud, online collaberation, it management, cloud strategies
    
IBM
Published By: IBM     Published Date: Oct 17, 2017
The data quality tools market continues to show strong revenue growth, driven by cost, process optimization and digital business initiatives. Applying data quality tools to existing and emerging business scenarios will enable data and analytics leaders to deliver greater business value.
Tags : 
    
IBM
Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
Published By: Oracle     Published Date: Feb 22, 2019
Oracle recently announced a range of self-driving, self-securing, and self-repairing cloud platform autonomous services under the umbrella of its broader PaaS portfolio. Oracle’s autonomous cloud proposition offers the combined benefits of developer productivity, faster time-to-value, and cost savings to its growing cloud services customer base. While Oracle has dedicated substantial investment and resources in developing one of the most extensive PaaS portfolios available in the market, it is the underlying autonomous capabilities that are a key differentiator, making the overall value proposition of Oracle PaaS portfolio more attractive to enterprise users.
Tags : 
    
Oracle
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
In this report, Forrester reveals how order management systems (OMS) solve the omni-channel deficiencies of traditional systems, allowing retailers to orchestrate complex order processing scenarios - from the point of capture, through the supply chain, and to the point of fulfillment. Read the report today.
Tags : 
omnichannel order management, ebusiness, order management
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Jul 02, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Tags : 
    
Group M_IBM Q418
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer service organizations are struggling to react to the pace of innovation and the explosion of channels and devices. To get ahead of these challenges, AD&D pros must deeply invest in automation — automated answers, automated conversations, automated agent guidance, and automated end-to-end processes. They must also invest in intelligence to ensure automated technologies evolve and learn from prior interactions over time. Automation and intelligence quell the headcount increases. They will free agents from working on low-value or repetitive tasks, as they will only have to address highly complex customer scenarios or exceptions to standard operations. This also enables them to focus on building connections with customers to garner their satisfaction and loyalty.
Tags : 
customer, service, operations, optimization
    
LogMeIn
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
    
Group M_IBM Q2'19
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search