device

Results 1 - 25 of 2859Sort Results By: Published Date | Title | Company Name
Published By: Korenix UK Ltd     Published Date: Jul 29, 2014
Bringing the latest security and surveillance systems (e.g. CCTV), as well as onboard entertainment technologies (Infotainment) such as passenger display screens and WiFi services, to the demanding Rail sector is a challenge. Reliability of these onboard technologies is critical for both train operators and passengers, while also improving the maintenance of onboard devices when trains are on the move.
Tags : 
wifi; cctv; onboard technology; trains
    
Korenix UK Ltd
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Lenovo - APAC     Published Date: Apr 27, 2020
You have to think beyond devices and connections if you want real protection for your organization. See how Lenovo ThinkShield delivers competitive advantage by orchestrating the complete portfolio of security technologies and best practice, including third-party solutions, to provide agile, end-to-end protection. It’s a solution built for fast-moving businesses, enabling innovation and growth. Get the most comprehensive protection with a modern Windows 10 Pro device powered by the Intel®. Learn more>>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Apr 27, 2020
More than half of the businesses that have suffered a data breach say it was due to a known, unpatched vulnerability. But you don’t need to be playing patch catch-up when automation, customization and persistence technology can take away all kinds of time-consuming processes. Get the full story on the latest agile security solutions with Think devices, powered by Windows 10 Pro and Intel®, in this quick overview from Lenovo ThinkShield.
Tags : 
    
Lenovo - APAC
Published By: Citrix     Published Date: Mar 26, 2020
According to the 2019 Ponemon Global Encryption Trends Study, 54 percent of companies consider employee mistakes the greatest risk to their information security. With your employees working on personal devices and taking their work outside of the office, it’s time to get serious about protecting your sensitive files and data. In this guide, you’ll learn 8 ways to safeguard your users from security mistakes, including: 1. Best practices for deploying and controlling file encryption 2. How to secure mobile devices wherever they’re used 3. The best ways to prevent unauthorized sharing of confidential files
Tags : 
    
Citrix
Published By: Citrix     Published Date: Mar 26, 2020
Your small business is primed for a growing future—but with every new employee and client, you have more files to store and manage. Without a strong file sharing solution, it’s tough for your IT team to manage secure, anywhere access to key files for all your users. The solution is to adopt an enterprise-grade file sharing platform that grows with you. In this e-book, you’ll learn how enterprise-grade file sharing supports your growth with: • More efficient collaboration processes • Streamlined security and compliance • Unified access to files across locations and devices
Tags : 
    
Citrix
Published By: Citrix     Published Date: Mar 26, 2020
There's a lot to think about when it comes to securing your sensitive data — like controlling access and meeting compliance. It can be overwhelming for small and medium-sized businesses. But we can help you boost your knowledge and simplify your approach to protecting important data so you can stay a step ahead in the security game. Download this e-book, and get your step-by-step guide to managing risk across: • Physical vulnerabilities • Unsecured networks • Mobile devices
Tags : 
    
Citrix
Published By: Citrix     Published Date: Mar 26, 2020
This white paper presents a complete approach to keep people productive during planned or unplanned disruptions, including best practices for a complete business continuity strategy as well as technologies to provide secure access to apps and data on any device, over any network or cloud. By ensuring seamless operations no matter what happens, Citrix Workspace solutions help protect your business from consequences such as financial losses, damaged reputation, weakened customer and partner relationships, and lost productivity.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Mar 26, 2020
Bring your own device policies have changed the way business resources are deployed and used. As a result, the complexity of managing and provisioning resources across all these disparate operating systems and device types causes a significant strain on IT resources to keep information safe and accessible. In this ebook, you will learn how Citrix Virtual Apps and Desktops: · Give users device flexibility · Secure remote access for your digital apps and desktops · Ease migration to Windows 10
Tags : 
    
Citrix
Published By: ForeScout EMEA     Published Date: Apr 28, 2020
Forescout researchers studied the devices and behavior of financial services networks to evaluate risk profiles and identify critical security issues. They leveraged the Forescout Device Cloud, which contains the anonymized fingerprints of more than 11 million devices connected to the networks of Forescout customers. The study, limited to 100 large Financial Services deployments, identified segmentation best practices and some surprising risk areas.
Tags : 
    
ForeScout EMEA
Published By: ForeScout EMEA     Published Date: Apr 28, 2020
Device visibility remains a daunting challenge for the modern enterprise. Forescout provides a multifaceted information technology (IT) and operational technology (OT) platform designed to solve visibility challenges for the modern enterprise by providing complete device discovery and classification, risk assessment, compliance, orchestration and automated security controls. Forescout’s latest release1 significantly extends the platform’s long-standing reputation for network admission controls and device visibility. In addition to deep device visibility in IT environments, the updated platform uses passive analysis to assess devices at all layers of the OT network, as outlined in the Purdue Enterprise Reference Architecture model.2 Passive analysis is particularly important in terms of ensuring safety and avoiding disruption of critical services in OT and medical device networks, given the business processes those networks and devices support. Gartner has recently stated that CIOs and
Tags : 
    
ForeScout EMEA
Published By: Oracle     Published Date: May 11, 2020
When you have thousands and even millions of smart devices and distributed energy resources, each with unique requirements for maintenance, inspection, updating, and security, just to name a few tasks, it can get overwhelming quickly. Knowing where they are much less what to do with each one can seem impossible. Read this eBook today to learn more: • Protect investment in smart devices throughout their lifecycle • Ensure revenue realization by safeguarding device performance • Increase customer choice and reliability through proactive management of DER and customer owned equipment • Simplify complex processes to reduce maintenance and overall management costs
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 12, 2020
As the utility-customer relationship continues to evolve and data expands across operations, meters and other smart devices are more important than ever in translating real-world events into digital intelligence. Oracle Utilities Meter Solution Cloud Service delivers the full power of our industry-leading meter solution but without the long upgrade projects, burdensome maintenance, scalability challenges, security concerns and other hassles of on-premises solutions. The result is that utility meter ops and IT teams can focus more on innovation, knowing the always-up-to-date solution is ready to go. • Focus on your business while Oracle Utilities does the heavy lifting on system maintenance • Streamline meter-to-cash processes with productized integration • Access (acceptance-based) new capabilities immediately via multiple mini-updates each year • Easily scale the solution as data volumes and processing needs expand
Tags : 
    
Oracle
Published By: Menlo Security     Published Date: Apr 30, 2020
Zero Trust Internet is the solution for 100% email and web security because it considers all traffic to be potentially dangerous and isolates it, instead of trying to classify email and websites as either "safe" or "dangerous." Menlo Security’s Isolation Core™ embodies the principles of Zero Trust Internet to create a technical milestone in cybersecurity. The Isolation Core™ rewrites incoming web code, removes active content, and safely projects inactive content to end-user devices without lag. All content goes through the same process to ensure full, proactive protection. Download this whitepaper to understand: • How the Zero Trust Internet paradigm creates a safe browsing and email experience • The weakness of traditional network architectures to safeguard the end-user experience • How Menlo Security helped a Fortune 100 company achieve zero malware attacks in six months while adhering to Zero Trust Internet practices with our Isolation Core™
Tags : 
    
Menlo Security
Published By: Naviga Global - 1H 2020 - Q1-20     Published Date: Jan 13, 2020
"In today's digital world, the process of selling ads and managing the operations of those sales has grown more complex. Advertisers require the ability to place ads on both print and digital vehicles, and ads are being viewed across multiple types of connected devices. But many publishers struggle with siloed systems and legacy technologies that are preventing collaboration and productivity among teams, as well as hindering sales. So how can publishers leverage their tech stack in order to excel in this rapidly changing, modern marketplace? Read this paper to learn: ? Why traditional datacenter infrastructure and technologies are creating inefficiencies and limiting sales potential ? How cloud-based, integrated ad platforms are transforming the sales cycle and streamlining operations ? Key capabilities you should look for in any digital platform selection Read the paper today!"
Tags : 
    
Naviga Global - 1H 2020 - Q1-20
Published By: Zinier APAC     Published Date: Mar 05, 2020
Smart machines are everywhere – in our homes, our driveways, even our power grids and assembly lines. Over the last three years, the number of connected devices has almost doubled, from 15 billion in 2015 to more than 25 billion today. By 2025, that number is expected to eclipse 75 billion. At the same time, wireless data traffic has seen explosive growth. In the United States, mobile data usage increased 54% over the last decade (Mobility Report. Ericsson, 2018). The rise of IoT-connected devices and increasing customer expectations around mobile broadband performance is putting tremendous pressure on existing infrastructure. In response, telecom companies are making massive capex investments in small cell networks.
Tags : 
    
Zinier APAC
Published By: Epsilon     Published Date: Mar 17, 2020
As digital marketing plays a bigger role in everyone's lives, email accessibility is becoming more important. In the U.S., the Americans with Disabilities Act (ADA) requires that everyone can access and read your emails, including people who use assistive technology such as screen readers, magnifiers, joysticks and eye-tracking devices. Read this e-book to learn more about accessibility in email, why you should care and how to build emails for everyone.
Tags : 
    
Epsilon
Published By: Epsilon     Published Date: Mar 17, 2020
To drive business performance and customer engagement, you need to have good identity resolution. But that hinges on getting identity right in the first place. We commissioned Forrester Consulting to evaluate how U.S. brands are doing at identity resolution strategies. Forrester found that at best only half of brands are capable of fundamental identity resolution capabilities, like finding customers across devices, controlling messaging frequency and building a unified customer profiles. The research assesses: how marketers are really using identity management today the gaps in their strategies recommendations to get on the right path
Tags : 
    
Epsilon
Published By: Medidata     Published Date: May 15, 2020
The backbone of drug and medical device development is the clinical trial process, which is regulated by regulatory bodies such as the Food and Drug Administration (FDA) and the European Medicines Agency. This is the lengthy and rigorous process by which new therapeutics are tested to demonstrate their safety and efficacy in human patients.
Tags : 
    
Medidata
Published By: McAfee EMEA     Published Date: May 12, 2020
As a senior consultant on the Foundstone Services incident response and forensic team, I regularly respond to a wide range of security incidents at client sites. I have assisted clients with the containment and eradication of malicious code (for example: ransomware and malware infections) and responding to unauthorized access/network breaches impacting their enterprise environment. During all of the responses, there was the need to identify the nature of the incident, assess the client’s security infrastructure, and work towards the identification of the threat or attack vector(s). The information gathered from the initial assessment and related analysis was then used to isolate and contain the malicious activity impacting devices within the environment. Connect
Tags : 
    
McAfee EMEA
Published By: Adobe     Published Date: May 07, 2020
With less deals closing in person, companies are focusing on enabling their teams to electronically send contracts, agreements, and other time-sensitive documents for signatures anytime, anywhere. Adobe Sign works seamlessly inside Microsoft Dynamics CRM, making it easy to get documents signed quickly right from mobile devices. Watch this on-demand event to find out how to simplify approval processes and speed time to revenue with the security and compliance you expect from Adobe. This webinar will show you how you can: Navigate the Adobe Sign Dashboard within Dynamics CRM Create contracts ready for signatures from within Dynamics CRM Send documents from Dynamics CRM’s Opportunity View Use real-time tracking and contract status from within any Microsoft 365 apps
Tags : 
    
Adobe
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: TIBCO Software     Published Date: May 05, 2020
Few technologies are advancing faster than those in the medical field, and the right advanced analytics software can be a game changer. This medical device company is a leader in development, manufacturing, and distribution of medical devices, including technologies that revolutionize whole blood and hemostasis testing. “We were data-rich but analysis-poor,” says a business analyst. “It was no longer viable for R&D to rely on IT for access to test data and perform one-off analyses in Minitab. They needed fast access to data and consistent and accurate analyses.” Implementing sophisticated analytics was especially critical because of the volume and complexity of its products, including hundreds of thousands of cartridges with sensors affected by a wide range of environmental factors. “We monitor sensor performance constantly and collect millions of records. We needed an analytics platform that would enable fast access to that data for troubleshooting any problems. And because there are
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.