HIT Consultant Insightful coverage of healthcare innovation
 

end users

Results 226 - 250 of 483Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 09, 2015
This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.
Tags : 
application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile
    
IBM
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
    
Absolute Software
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Infoblox     Published Date: Feb 03, 2009
Today’s networks support more applications, traffic, users, and devices than ever before – a trend that only increases on a daily basis. At the heart of all IP networks live core network services, like DNS, DHCP, and  RADIUS that are crucial for keeping traffic flowing, users connected, and applications available.
Tags : 
infoblox, core network services, dhcp, ip networks, radius, ip address assignment, ipam, ip telephony
    
Infoblox
Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue, application performance, smartphones
    
Aternity
Published By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : 
aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
    
Aberdeen Group
Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience, deliver, access, app, cost, management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2015
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Tags : 
best practices, business optimization, business management, security
    
Citrix Systems
Published By: LogMeIn     Published Date: Jan 15, 2014
Nucleus found that the ease of use for end users and administrators led to increased adoption, improved business productivity, and IT efficiencies. Also, join.me’s low pricing relative to functionality resulted in significant cost savings.
Tags : 
logmein, join.me, conferencing, collaboration, support presentations, online collaboration, ease of use, increase adoption, business productivity, it efficiency, cost savings, it support, quality experience, communications server, conferencing vendors, traditional vendors, cloud-based collaboration, content developer
    
LogMeIn
Published By: LogMeIn     Published Date: Jul 18, 2014
A research report on streamlining the customer experience with mobile chat.
Tags : 
mcommerce, live chat, boldchat, logmein, customer support, mobile trends, mobile users
    
LogMeIn
Published By: LogMeIn     Published Date: Sep 16, 2014
This Frost & Sullivan article provides insights on the top trends in web conferencing and how businesses users have a widening choice of solutions, including join.me, that offer real benefits for companies of all size.
Tags : 
web conferencing, video conferencing, trends in web conferencing, logmein, joinme
    
LogMeIn
Published By: LogMeIn     Published Date: Sep 16, 2014
This Frost & Sullivan article provides insights on the top trends in web conferencing and how businesses users have a widening choice of solutions, including join.me, that offer real benefits for companies of all size.
Tags : 
web conferencing, video conferencing, trends in web conferencing, logmein, joinme
    
LogMeIn
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : 
big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies, siem use cases, customer stories, federal government, healthcare provider, retailer, utility company, financial services
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: RightAnswers     Published Date: Sep 04, 2013
Every day, technology plays a bigger and bigger role throughout corporate America, corporate success becomes increasingly dependent on productive use of information technology – and IT support grows more critical. But while excellent IT support rapidly returns users to productive work, the information necessary to that excellence is often fragmented in different parts of the IT organization. Effective knowledge management empowers service desks – and even users themselves – by enabling quick, accurate and consistent user solutions. That leads to measureable benefits for your business. This brief explores 20 metrics that measure those benefits – in other words, your “return on knowledge.”
Tags : 
return on knowledge, knowledge management, rightanswers, knowledge, measuring business benefits, crm, customer relationship management, crm, b2b
    
RightAnswers
Published By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter
    
VMware, Inc
Published By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : 
vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup, pc life-cycle management tools
    
VMware, Inc
Published By: Polycom     Published Date: Dec 18, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : 
skype for business, collaboration, video conferencing, content sharing, call management controls, microsoft office 365
    
Polycom
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Gigya     Published Date: Jun 08, 2015
Social login adoption is growing at a rapid clip as businesses come to understand social login as more than just a means to faster registration, and as a key for gaining access to rich, permission-based identity data that drives relevant user experiences. You’ll learn: About the state of social login and latest trends What benefits social login provides for users What value social login can bring to your business Best practices when implementing social login Case studies from leading brands that are using social login
Tags : 
social login, user experience, faster registration, social login benefits, best practices
    
Gigya
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.