secure content

Results 26 - 50 of 88Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Mar 02, 2018
Enable Business Transformation with MobileIron EMM
Tags : 
     MobileIron
By: MobileIron     Published Date: Oct 29, 2018
Drive mobile productivity through secure content management
Tags : 
     MobileIron
By: IBM     Published Date: Nov 10, 2016
Within any organization, business content – applications, forms, reports, office documents, audio, video, and social media – is poorly managed and often out-of-reach of critical business processes. And, when business content is invisible, unclassified or unmanaged, it creates chaos. Content chaos causes a breakdown in the flow of information between an organization and its customers, its partners and even within itself – failures that often impact customer engagement, business agility, and the capacity to collaborate securely and effectively. It's time you learn how to put your business content to work.
Tags : ibm, analytics, ecm, business cost, business process, enterprise applications, business technology
     IBM
By: IBM     Published Date: Jan 19, 2017
Read this article to understand how Box can revolutionize the way your marketing team creates campaigns in just five ways: 1. Complete projects, fast 2. Work with outside contractors and agencies, securely 3. Access files here, there and everywhere 4. Equip sales team with winning tools 5. Distribute campaign content easily
Tags : ibm, marketing, box, ibm box, campaigns, knowledge management, business technology
     IBM
By: IBM     Published Date: Mar 20, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : ott. security, ibm, content security, cloud, cloud migration
     IBM
By: IBM     Published Date: Apr 10, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : ibm cloud video, premium content, cloud migration, security, content
     IBM
By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
     Menlo Security
By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
     Citrix ShareFile
By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
     Cisco and NVIDIA Corporation
By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps businesses integrate these applications and in particular add secure mobile collaboration to Microsoft Office 365. This whitepaper best practices for integrating two common enterprise applications – content creation and collaboration – with Box and Office 365. It provides a guide for business making the transition to the cloud and key use cases for collaboration.
Tags : box, enterprise transformation, enterprise content collaboration, office 365, microsoft, api integration, content creation, content collaboration
     Box
By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
     Box
By: Citrix Systems     Published Date: Oct 07, 2014
Mobile workspaces fulfill the vision for anywhere, anytime flexibility and productivity. People are empowered to get their work done in an always-on, fully secure environment that follows them everywhere, on any device. With seamless access to all corporate resources—even on the same devices that hold their personal content—people can get their work done faster and better for optimal business impact. By achieving true enterprise mobility, the organization as a whole gains new levels of agility and performance. This paper discusses the elements to a complete mobile workspace solution.
Tags : business, growth, workspace, mobile, experience, launch, windows, desktop
     Citrix Systems
By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : enterprise applications, data management, business technology
     hightail
By: Lenovo and Intel®     Published Date: May 02, 2017
Body cam technology produces terabytes of data to manage and maintain. It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content?—?and that makes HUGE demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions.
Tags : 
     Lenovo and Intel®
By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
By: Computhink     Published Date: Dec 10, 2007
Like most law firms, Salter Feiber deals with vast amounts of documents, a significant portion of which needs to be kept for long periods of time. "We tried to keep the files closed during the last 12 months onsite," says Kim Chewning, Firm Administrator. "Everything else was sent to a third party for storage in a secure facility." However, as the archive grew, so did the storage cost.
Tags : documents, document, document management, storage, law firm, lawyer, secure content management, customer service
     Computhink
By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention
     Symantec.cloud
By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
     Box
By: Red Hat     Published Date: Mar 16, 2015
With Red Hat® Satellite, you can instantly see the status of your systems and if any are missing important patches or configuration changes.Not only does Red Hat Satellite improve security, it lets you easily measure and report on the patch level of systems in your company. Your security posture is improved through: • A single, centralized management tool. • Secure connection policies for remote administration. • Standardized machine configurations. • Digitally signed content.
Tags : centralized management took, security posture, configurations, remote administration, it management
     Red Hat
By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence
     Proofpoint
By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
     YouSendIt
By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
     YouSendIt, Inc.
By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
     Limelight Networks
By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : mobile apps, mobile content, mobile security, corporate content
     bigtincan
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com