HIT Consultant Insightful coverage of healthcare innovation
 

mobile workers

Results 176 - 200 of 202Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Sep 10, 2010
The forces of consumerization are sweeping over the mobile world, with workers bringing their personal devices into the office and increasingly asking for IT support for those devices. How you respond to this challenge will say a lot about the mobile environment of your organization as a whole, and a lot as well about just how productive these mobile users can be. This strategic PlayBook and accompanying Webcast will offer you very practical ways to grab hold of this mobile trend of consumerization and help your mobile workers to be more effective and productive.
Tags : 
sap, consumer mobile devices, iphone, adoption, mobility, wireless, smartphones
    
SAP
Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape
    
SAP
Published By: SAP     Published Date: Dec 20, 2010
This article will discuss how SAP is working to enable mobility for its customers and provide an overview of several of SAP's key mobility tools and applications.
Tags : 
sap, mobility, competitive edge, mobile workers, sybase, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape, sms, mms, meap
    
SAP
Published By: SAP     Published Date: Dec 20, 2010
Mobility is sweeping across the enterprise. Consider a company like Kindred Healthcare, which has boosted the productivity of its rehabilitation therapists and the accuracy of its patient records through the use of mobile devices.
Tags : 
sap, sybase, mobility, mobile workers, idc, mcommerce, healthcare
    
SAP
Published By: SAP     Published Date: Oct 05, 2010
This paper will examine the state of consumer mobile in retail today, Driven in part by RSR's research among retailers as well as a look at the mobile use---cases that retailers have currently deployed.
Tags : 
sap, mobility, competitive edge, mobile workers, shopper, ecommerce, consumer mobile, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
Explore the Aberdeen e-book "High-Performance Organizations Empower Employees with Real-Time Mobile Analytics" - and see how you can get the edge. Hear from industry experts how to effectively roll out your mobile analytics strategy, and empower your front-line workers with real-time insight and tools. Don't confine intelligent decisions to desktops - be ahead of the mobile analytics curve.
Tags : 
sap, mobile, mobile analytics, real-time, technology, high-performance
    
SAP
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Published By: ServiceNow     Published Date: Mar 26, 2014
This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
mobile initiatives, mobile applications, mobile workers, mobile implementation
    
ServiceNow
Published By: Sitrion     Published Date: Oct 04, 2016
Communications is all about making sure all employees are engaged, aligned, and informed. It is your opportunity to leverage mobile technology and employee apps to improve your communications—connecting remote workers with the enterprise, saving money and time, and empowering employees to be more productive. Download this white paper to learn more about how mobile can help you reach and engage with your remote workforce
Tags : 
    
Sitrion
Published By: Soonr     Published Date: Jul 30, 2014
Today’s worker is more mobile than ever. As a result, practices for file sharing and document collaboration have changed dramatically over the past year. This study examines how mobility affects today’s workplace including the devices used to access business files, how files are being accessed, and from where.
Tags : 
soonr, mobile, workers, employees, mobility, file sharing, remote access, mobile access
    
Soonr
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : 
symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security, managed service, managed services, network security, email security software, managed email security, skeptic, email, email security solution, mta
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device
    
Symantec.cloud
Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing, laptops, communications
    
TheMarketingScope
Published By: Toshiba     Published Date: Jun 06, 2012
Your staff will be more content if they can install their choice of software. Here's how to give them that freedom while keeping control.
Tags : 
toshiba, mfp, printers, copiers, printers, employees, laptops, it management, mobile workers, employee laptops
    
Toshiba
Published By: Toshiba     Published Date: Oct 01, 2013
Workers still see value in laptops for running most critical apps, IDC survey says. Click here to find out why.
Tags : 
toshiba, laptop, mac, computers, mobile workers, remote workers, international workers, printers, copiers, mfp, employee technology, workforce technology
    
Toshiba
Published By: Vidyo     Published Date: Jun 12, 2013
This report examines the imperative to move to personal video conferencing and presents Vidyo’s solution for more effective, scalable, and affordable video conferencing to create a unique competitive advantage.
Tags : 
vidyo, web conferencing, conferencing, video feed, mobile workers, international workers, unified communications, video feed
    
Vidyo
Published By: Vidyo     Published Date: Nov 12, 2013
Read how Vidyo is a leader and innovator in bringing software-based architecture that is needed to deliver the scale to support hundreds of thousands of personal endpoints.
Tags : 
vidyo, web conferencing, video conferencing, mobile workers, byod, company meeting, international employees
    
Vidyo
Published By: Vidyo     Published Date: Jun 10, 2013
Discover how two medium-sized companies leverage cutting-edge solutions from Vidyo to improve productivity, reduce project completion time, and improve quality of life for their employees.
Tags : 
vidyo, video collaboration, web conferencing, video conferencing, mobile workers, mobile office, video feed, video integration, collaboration
    
Vidyo
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch
    
VMware AirWatch
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
    
Webroot UK
Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic, mmas, mobile malware, webroot security
    
Webroot UK
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.