device function

Results 1 - 25 of 45Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: HP Inc.     Published Date: Jun 03, 2019
As the changing workforce puts pressure on companies to adopt the use of mobile and personal devices, significant business trends, such as data analytics, the digitization of business functions and the blending of service offerings across industries, are also expanding the use of technologies. This expansion increases the boundaries of what’s possible, and it also creates risks.
Tags : 
    
HP Inc.
Published By: Intel     Published Date: Apr 16, 2019
The data center is coming under immense pressure. The boom in connected devices means increasing volumes of data – and all that needs processing. One way for CSPs to accelerate customer workloads is by using FPGAs, which are easier to use than ever before. Download Intel's latest eGuide, ‘FPGA-as-a-Service: A Guide for CSPs' to discover: • How to add FPGAs to the data center • The structure of the Intel® Acceleration Stack for FPGAs • Adding off-the-shelf accelerator functions • How FPGAs can accelerate many cloud services, such as database as a service and analytics as a service
Tags : 
    
Intel
Published By: VMware     Published Date: Apr 09, 2019
In the modern digital age, traditional barriers to entry and time to market have fallen. Agile businesses can turn an idea into an app, host it in the cloud, and quickly deliver it to millions of customers on their chosen devices and platforms. In comparison, many larger enterprises miss new business opportunities because they’re mired in managing complex, legacy infrastructure, inefficient cross-functional workflow and approval processes, and lengthy audit and compliance requirements.
Tags : 
    
VMware
Published By: Intel     Published Date: Feb 28, 2019
Digital transformation and smart technologies are paving the way towards smarter healthcare. Medwel understands that the goal of smart hospital development stems from the needs of the patient. By tapping on ICT advancements in the healthcare environment, the common goal is to reduce medical errors and achieve a holistic approach centered on the patients’ needs. Read more about the new MEDS-P1001—a 10.1” medical grade touchscreen PC that boosts • Effective computing through low power consumption • Interoperable through dual OS for different applications in hospitals • Health insights based on smart interfaces of vital sign measuring devices • Expandable functions through peripheral devices such as cameras, RFID reader, WIFI, etc. • Refined and reliable design that is slim, lightweight, antibacterial, water and dust-proof
Tags : 
    
Intel
Published By: Avaya     Published Date: Nov 07, 2018
How new technologies will change how people connect with each other and serve customers tomorrow. The Leader’s Guide to the Future of Work, featuring Gartner Research, introduces you to a world where technology helps people connect better – with each other and with their customers. The workplace as we know it today is evolving into a digital, virtual work space, where work becomes more fluid, more project-based and more mobile than today. Where teams communicate and collaborate more effectively, beyond devices, physical locations and functions – even beyond the boundaries of the enterprise. And where humans and machines not only work together, but complement each other effortlessly.
Tags : 
    
Avaya
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
    
Hewlett Packard Enterprise
Published By: HP Inc.     Published Date: Jun 12, 2018
With the HP Jet Fusion 300/500 series of 3D printers, future-ready technology is at hand – and handy – for small and medium businesses, design firms, and universities. Read this brochure to get the details on how HP Jet Fusion 3D devices are designed for convenient in-house production. You’ll be making prototypes and functional parts at new levels of speed and precision, in full color, black or white. Get the brochure
Tags : 
    
HP Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: HP Inc.     Published Date: Apr 11, 2018
With the HP Jet Fusion 300/500 series of 3D printers, future-ready technology is at hand – and handy – for small and medium businesses, design firms, and universities. Read this brochure to get the details on how HP Jet Fusion 3D devices are designed for convenient in-house production. You’ll be making prototypes and functional parts at new levels of speed and precision, in full color, black or white.
Tags : 
    
HP Inc.
Published By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
    
TE Connectivity
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
    
VMware AirWatch
Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services
    
Zebra Technologies
Published By: Intel     Published Date: May 23, 2017
Using the IP Multimedia System (IMS) architecture, Communications Service Providers (CSPs) can offer session-based services. Any Internet Protocol/Session Internet Protocol (IP/SIP) device can establish a session with the control servers’ Call Session Control Function (CSCF) and then establish connections with other IP/ SIP devices to deliver voice, video, and data sessions between the two end-clients.
Tags : 
    
Intel
Published By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : 
cyber security, lookout, smartphone, tablet, mobile
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : 
enterprise, mobile, security, lookout, revolutionary
    
Lookout
Published By: VMware     Published Date: Feb 24, 2017
This Radicati Market Quadrant provides a competitive view of key players in the Enterprise Mobility Management market. Vendors are positioned in the quadrant according to two criteria, installed base market share and functionality. Analyzing 14 features such as deployment scenarios and device level analytics, Radicati gave VMware AirWatch® a functionality score of nine out of 10. Additionally, Radicati ranked the AirWatch market share as No. 1, positioning AirWatch as the leader furthest to the top right corner of the quadrant.
Tags : 
    
VMware
Published By: Cisco     Published Date: Dec 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault
Published By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
cisco systems, mobility, going digital, midsize businesses, smb, mobility infrastructure
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
wireless management, wireless, communications, business practices, small business
    
Cisco
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.