HIT Consultant Insightful coverage of healthcare innovation
 

remote

Results 376 - 400 of 743Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: GoToMeeting     Published Date: Oct 11, 2011
Distributed work programs are one of the most effective ways of achieving badly-needed operational savings. To be effective, however, you need to know which practices and tools are most effective for managing remote staff. This new white paper addresses three fundamental management questions, explores key challenges of managing remote workers and provides best practices for setting up a successful remote work program.
Tags : 
citrix, technology, business. remote work program, management, employee
    
GoToMeeting
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToMeeting
Published By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : 
wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker
    
Motorola
Published By: Kaon     Published Date: Feb 01, 2012
Savvy marketers are looking for ways to reuse interactive content across multiple platforms and venues to save money. Learn how virtual product demonstrations can be CREATED ONCE and reused ANYWHERE to reduce costs and accelerate sales.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Kaon     Published Date: Feb 01, 2012
As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth
    
LogicNow
Published By: LogMeIn     Published Date: Jun 23, 2015
This infographic illustrates how SaaS deployment model saves you money.
Tags : 
roi, return of investment, saas, saas deployment model, costs
    
LogMeIn
Published By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : 
multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software
    
Echopass
Published By: BlackBerry     Published Date: Mar 23, 2010
Mobility is the future of business; more business is conducted in real time and between geographically dispersed situations than ever before. Also, mobility ties closely into important collaboration trends including the increasing use of social networking tools such as Facebook, LinkedIn and Twitter. The smartphone- a symbol of an increasingly mobile and interconnected population-is a familiar piece of technology for most employees.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: Intel     Published Date: Aug 10, 2012
An in-depth look at how McAfee Deep Defender and DeepSAFE work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
For companies that sell products or services that require technical support, the support customers receive might be the only personal experience they can use to gauge their satisfaction with an organization. Since, for many of these organizations, customer satisfaction directly affects revenue, measuring customers’ satisfaction with the service experience and the services provided is extremely important as it enables these organizations to manage and improve the customer experience. This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers.
Tags : 
logmein, hdi research corner, customer satisfaction, customer support, support services, remote support, technical support, remote desktop connection
    
LogMeIn Rescue
Published By: AWS     Published Date: Jul 16, 2019
Ypsomed is a leader in the development and manufacturing of injection and infusion systems. The company is keenly aware of the multi-billion dollar problem of poor medication adherence and the need to measure medicine intake and ensure doses are taken at the correct time. Ypsomed sought to create a digital solution for medication adherence monitoring and smart device management for contract research organizations’ (CROs) use in clinical trials, including self-injection systems for trial participants to administer medications at home. Yet the company faced serious demands for remote device management, global scale, and privacy and security regulations such as HIPAA and GDPR. To solve these challenges, Ypsomed adopted Philips’ HealthSuite digital platform (HSDP), a cloud platform built on Amazon Web Services (AWS). HSDP allows Ypsomed to connect devices to the cloud and remotely manage them; store data; and manage and scale services globally within healthcare regulatory, privacy, and s
Tags : 
    
AWS
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Axeda Corporation
Published By: Symantec.cloud     Published Date: Jan 26, 2011
Growing businesses face real difficulties in protecting their users, especially remote workers, while keeping management costs down.Understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
symantec cloud, endpoint security, remote worker, mobile environment, spyware, intrusion
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Absolute Software     Published Date: Jan 19, 2010
This whitepaper explains step-by-step how you can deploy a complete Snow Leopard disk image to a Mac OS X computer, even while it is being used. No immediate boot from a server, FireWire drive, or boot DVD is necessary, and no pre-configuration of the target computer is required.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : 
kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
    
Kaspersky
Published By: BlackBerry     Published Date: Dec 22, 2009
University of Waterloo conducted a six-week pilot project with several of its students in the Project Leadership Program, a distance learning program. Their goal was to see if mobile learning using BlackBerry smartphones would enhance their educational experience.
Tags : 
blackberry, mobile applications, waterloo, cio, pim, voip, smartphones, it communication
    
BlackBerry
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: BlackBerry     Published Date: Apr 20, 2009
Ricoh Americas Corporation (Ricoh) is a provider of document solutions, including digital imaging systems, fax machines, printers, scanners and data storage. Ricoh wanted a solution to automate service calls handled by field service technicians. They decided to create an application for the BlackBerry solution that would improve call efficiency and give technicians more control over the tasks performed during their day.
Tags : 
blackberry, ricoh, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software
    
BlackBerry
Published By: Mitel     Published Date: Dec 20, 2016
Remote working programs can deliver great advantages to employers alike, but they require a higher level of connectivity to function at their best. Mobility tools like those from Mitel can help keep your employees connected and productive anywhere with a seamless, user-friendly experience.
Tags : 
    
Mitel
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.