View

Sorting

Products found: 11

logo
Offer a reference bonus
0.00

Cisco Connected Mobile Experiences (CMX)

Cisco Connected Mobile Experiences turns the industry-leading wireless infrastructure into an intelligent platform that not only provides a reliable connection, but also provides analytic customer information that you can use to grow your business. As the undisputed leader in the Wi-Fi market with over seven years of experience in Wi-Fi location, Cisco is a trusted partner Cisco Connected Mobile Experiences (CMX) uses a high-density wireless network with the Cisco® Mobility Services Engine, which enables organizations to collect aggregated location data for Wi-Fi users. CMX Analytics is a data visualization module that helps organizations use the network as a source of data for business analysis, highlight behavioral patterns and trends, which, in turn, can help businesses make informed decisions about how to improve customer service and improve their quality. service.

Benefits
With the CMX solution, you can:
  • Analyze business performance and optimize marketing activities through quantitative analysis of activity at your facility, for example, determining the patency of a particular store
  • Increase the profitability per square meter by optimizing the location using the detailed traffic of the outlet, the conversion rate of visitors into customers, as well as other information, up to specific zones, as well as quantifying the implementation of changes
  • Increase customer satisfaction by ensuring that there are enough staff during peak periods
  • Increase profitability using location data for optimal mobile marketing campaigns.
... Learn more
ROI-calculator
Configurator
ROI-
-
9
9
logo
Offer a reference bonus
2.70

Citrix Workspace

With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can waste searching across locations for information. This is all while dealing with performance and security issues that can further hinder the employee experience. Citrix Workspace is the only solution that delivers a unified, secure and intelligent workspace that lets people do their best work while maintaining a high-quality user experience.

With Citrix Workspace users get a seamless work experience regardless of the type of app, device, network, or location, without a lot of extra steps. IT maintains control and visibility of SaaS, mobile, virtual, and web apps with a simple and integrated solution that enhances user experience, giving them the best tool to work efficiently. Compare below to see which product best suits your business needs.

Citrix Workspace

  • Provides employees a single, actionable view into all of their systems.
  • Breaks down complex SaaS applications into single-purpose streamlined workflows.
  • Automates work by pushing important information and tasks to any device, intranet or messenger.

Services included

  • Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktop Service)
  • Citrix Endpoint Management (formerly XenMobile Service)
  • Citrix Content Collaboration (ShareFile integration)
  • Citrix Access Control
  • Citrix Analytics
... Learn more
ROI-calculator
Configurator
ROI-
-
0
3
logo
Offer a reference bonus
0.00

CiviMOBILE

CiviMobile is a native mobile application that allows CiviCRM users to leverage the combined benefits of the software and their smartphones. When mobile devices have become our reliable organisers and companions, wouldn’t it be great to use them to improve organisational processes boosting personal efficiency and time management? Using the mobile app for CiviCRM, you will have an easy way to add and dial organisational contacts and manage activities, cases and events – something members need and lack most when doing a fieldwork.

CiviMobile Features

  • Contacts

  • Profiles

  • Graphical Calendar

  • Events

  • Map Navigation

  • Membership

  • Relationships

  • Contributions

  • Activities

  • Cases

  • Settings

  • Working offline

Security

CiviMobile has a user identification system that allows a secure connection between your device and a CiviCRM system. For your convenience, you use the same login information as for a web version. If your CiviCRM has a distributed access control, it will be supported in the mobile application too.

Contacts

Just imagine that you can find the right contact in your CRM system and dial it right away! You may search for the right contact by name or surname, as well as look through all CiviCRM contacts to find the one you need. Have met a new volunteer or subcontractor? Create a new contact of any type in the system on the go. No more notes or typing phone numbers from a PC screen – with CiviMobile, a comprehensive contact book is already on your device.

Profiles

The mobile app for CiviCRM will allow you to view and edit the profiles of individual members, households and branch organisations. Members’ profiles display comprehensive information about the contacts: what organisations they belong to, their addresses, phone numbers and links to websites and social media profiles. The ability to update the data allows keeping it up to date and having a handful of ways to reach out anywhere and anytime.

Graphical Calendar

Stay on top of your schedule with CiviCalendar, which will display all of your events, activities and cases in a user-friendly format. Calendar is implemented as a dashboard so that you will see it first any time you open a mobile app for CiviCRM. You may also use a filter and view only the events you are subscribed to or the activities/cases you are engaged in for better visibility.

Events

Using CiviMobile app, you can view all of the organisational events and subscribe for the one you want to attend. An ability to filter all events by type, date or title will certainly make the choice easier for you. What is more, immediate access to all of your past and future events will make sure you can easily view their details on the go. In addition, the app allows sharing the event and switching to navigation to easily find the event’s location.

Map Navigation

CiviMobile will help you find direction to organisational offices and events’ locations. All you have to do is just to click on the map displaying the addresses in the CiviMobile app. Choose the best route and receive turn-by-turn guidance to easily reach the necessary location.

Membership

CiviMobile allows to view your current membership statuses and membership statuses of your contacts. Once the membership is about to expire, you can renew it in one click using your mobile phone so that you never lose the associated benefits or privilege.

Relationships

View and create new relationships directly though the CiviMobile app to establish a clear connection between contacts. What’s more, this feature helps to easily access all contacts you are related to via cases.

Contributions

Do you want to know how much you have actually spent on membership dues, donations or events? CiviMobile gives a quick access to the history of your contributions showing details on the date, the amount and the type of your payment. The app has also got totals and averages calculated for you.

Activities

With CiviMobile, you can view activities and details on them, update activity information, as well as add a new activity to the case. Assign or reassign activities to particular users right away to make sure the work is done in time. Keep track of the priority status for effective time management anywhere and anytime.

Settings

A Settings screen allows customizing the CiviCRM application to your needs and preferences. For example, you may choose a language of your app so that it does not have to be a default mobile phone language. You may also choose a start screen that you will see first when opening the app.

Working offline

CiviMobile allows all the mentioned features regardless internet access availability. Being offline, you will work with cached data. All the updates you make will be stored in the cache and merge with CiviCRM database immediately after the connection resumes.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
15
logo
Offer a reference bonus
0.00

Hexnode

Hexnode is a comprehensive Unified Endpoint Management solution from Mitsogo Inc. that aims to simplify how people work. The management platform streamlines the complete device lifecycle model to provide support at every stage, from device onboarding to the end of its life. Additionally, it provides a hands-free experience with automatic enrollment utilizing Knox Mobile Enrollment, Zero-touch enrollment, Apple Business Manager, and endpoint management with the aid of dynamic group allocation in the event of policies. Furthermore, Hexnode supports all major device platforms and assists in the security, monitoring, and management of both BYOD and corporate-owned devices. These capabilities make Hexnode popular for SMBs and Fortune 500 enterprises worldwide. Take a look at the ROI you can generate with the help of Hexnode.
https://www.hexnode.com/roi-calculator/
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Ivanti User Workspace Manager (UWM)

Ivanti User Workspace Manager enables an unparalleled user experience, increases productivity, and liberates IT from the shackles of slow and complex desktop tools. With Ivanti, migration to Windows 10 and adoption of cloud services, including Office 365, is smooth, risk-free, and simplified for both IT and users alike.
  • Effortless user migration.Migrate user profiles, settings, and files to Windows 10 with or without hardware refresh—with no disruption to the user and minimal effort for IT.
  • Ease the move to the cloud. Smooth your journey to the cloud by roaming the user experience seamlessly between on-premises and cloud infrastructure using scalable, robust web services.
  • Ensure a great user experience. Eliminate logon scripts, eradicate complex group policy configuration, and deliver just-in-time personalization for lightning logon times. Ensure fast desktop and application response.

Simplify Digital Workspace Management
Ivanti User Workspace Manager enables organizations to reap the benefits of Ivanti solutions such as Environment Manager, File Director, Performance Manager, Application Control, and Insight:
  • Agile Windows migration. Achieve future-proof, continuous migration with ease
  • Easy file management. Eliminate data sprawl and reduce data center costs
  • Faster cloud adoption. Consistent on-premises, hybrid, or full-cloud desktops
  • Better user experience. Higher user acceptance of desktop transformation projects
  • Greater security and compliance. Out-of-the-box protection against unknown threats

Transform the User Workspace With User Workspace Manager, you can deliver responsive, secure desktops that users love, save money on server hardware, reduce IT management, and eliminate security risks. Detect challenges affecting user experience, quantify what is causing the issues, and benchmark how IT changes can optimize your endpoints. Patented resource management techniques ensure users are provided with the best desktop performance possible and increase user density in virtual desktop environments — often by as much as 40 percent. Abstracting users’ personal settings and files from the underlying device and operating system enables effortless migration to new desktops, platforms, or services, providing a consistent and familiar workspace for mobile users.
Powerful application control and privilege management capabilities ensure secure desktop and server environments and ease the burden of satisfying regulatory compliance.

Key Feature: User Personalization
On-demand personalization eliminates typical problems associated with roaming profiles including slow logon times due to profile bloat, and loss of personal settings and helpdesk calls due to profile corruption.
Stream personal settings as required, at application start or stop, to alleviate the burden on the logon process and provide rapid logon times.
Roll back personal settings on a per-application basis to reduce profile-related support calls and eliminate user downtime. Bulk updates on centrally-stored profile data equip IT with new problem-solving capabilities and ease the process of rolling out network changes to user sessions.

Key Feature: Desktop Configuration
The multi-threaded logon engine in User Workspace Manager replaces slow and complex logon scripts and GPO settings with context-aware actions that can be applied simultaneously at logon, rather than one-after-the-other.
Desktop configuration items typically configured to apply at logon can alternatively be set up to occur throughout the user session, on-demand, to reduce the burden on the logon process. This provides even quicker logon times and a much-improved user experience.

Key Feature: File Sync and Migration
The granular sync mechanism in User Workspace Manager allows users’ files to be synced to on-premises or cloudbased storage from anywhere within their user profile — either in the background, on-demand, or in real-time—to provide effortless migration of users’ files and eliminate the issue of data sprawl where user files are saved across different devices.
What’s more, migrating user files from on-premises storage to the cloud also means you reap the benefits of the 1TB of free OneDrive for Business storage per user with every license of Office 365.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Ivanti Workspace Control

Controlling User Access while Delivering a Personalized Experience IT organizations must balance control of applications, services, and assets with enabling personalized user access. What apps and services do workers need? What printers should they have access to? What resources should be blocked if they’re on an unsecure public network? IT teams typically handle these issues manually, often relying on scripts that must be managed and maintained, overloading the team and preventing them from working on more strategic projects. The results are often:
  • Delays in providing workers access to the digital resources they need
  • Inadequate definition and enforcement of access policies—especially restriction of privileges when users work from non-secure devices or locations
  • Valuable IT staff time consumed by routine administration
These problems impact the business in the form of lost productivity, security risks, poor compliance, user frustration, high IT expenses, and compromised user productivity. Ivanti® Workspace Control, powered by RES, allows IT to centrally manage and control the user workspace across physical, virtual, and hybrid environments. Workspace Control drives user productivity by providing workers with a familiar and seamless experience that adjusts to changes in their work context.

Key Feature: Easy Workspace Personalization Workspace Control lets IT create a highly personalized user workspace for workers based on what they need to do their jobs—and what they can access based on IT and corporate policy.

Key Feature: Context Awareness Allows IT to apply the appropriate policies to each user’s desktop session, whether that session is delivered via VDI, app virtualization, or conventional thick-client architecture.
Context rules detect aspects of the user’s current state related to access policies (like location, network connection type, device type, time of day, etc.) and controls access accordingly.

Key Feature: Web-based Management Workspace Control provides IT with an easy-to-use, webbased interface for managing user and application security settings and allowing the IT helpdesk to troubleshoot the desktop configuration. Key Feature: File Certificate-based Application Whitelisting File certificates allow IT to create rules to whitelist applications from a specific vendor or product name using the certificates of signed executables—providing the same level of security as file hashes, but with fewer rules and a lot less maintenance.

Key Feature: Application Whitelist Monitor Simplifies security whitelisting across a large, dynamic application set by automating the generation and maintenance of hashes and file certificates.

Transform Digital Workspaces Ivanti Workspace Control is an ideal complement to VDI, mobility, and other digital workplace transformation strategies, since it provides an automated, policy-based way of mapping individual users to their digital workspaces across devices and delivery platforms. Users can roam seamlessly across hybrid environments for full productivity. And, because Workspace Control decouples the desktop experience from underlying infrastructure, IT upgrade projects are easier to execute and less disruptive to users.

Deliver a Consistent User Experience Workspace Control helps IT provide a consistent user experience across desktops, laptops, tablets, and smartphones—while still applying the appropriate resource limitations as workers move from office to home to the road.

Regulatory and Corporate Compliance Whether it’s meeting software licensing agreements or adhering to regulatory restrictions, Workspace Control allows IT to set, enforce, and report on granular policy rules at the user level. IT gains control over user behavior while still providing the necessary access to resources to keep users productive, plus the ability to document and demonstrate compliance.

Citrix XenApp and XenDesktop Support Workspace Control is compatible with Citrix XenApp/XenDesktop 7.15 LTSR.

Updated macOS and Linux Support The macOS and Linux agents have been updated to support the latest releases of macOS, CentOS, and Red Hat Enterprise Linux.
Ivanti Workspace Control reduces the complexity of managing the user workspace to deliver:
  • A more productive and engaged workforce
  • Improved corporate and regulatory compliance
  • Lower cost of IT operations
  • Better allocation of IT staff and skills
  • Greater organizational agility
  • Simplified infrastructure upgrades
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

McAfee MVISION Mobile

Always-on defense for on-the-go devices

Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier—and even offline.

Advanced analysis thwarts advanced attacks

Machine learning algorithms analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify advanced device, application, and network-based attacks.

A single console for all devices—including mobile

As an integrated component of McAfee Device Security, McAfee MVISION Mobile extends visibility and control of your mobile assets from the same single console of all your McAfee-managed devices, including OS-based endpoints, servers, containers, and embedded IoT devices.
... Learn more
ROI-calculator
Configurator
ROI-
-
9
19
logo
Offer a reference bonus
0.00

MobeliIron Threat Defense

What if you could protect your company from data loss in the event of any mobile threat so you are not cleaning up after an attack? In the world of modern work, your users would be delighted and productive, and your organization would be innovating and growing. Organizations are challenged with visibility into malicious threats, meeting compliance and regulatory security guidelines, and lack complete control over employee-owned devices. Users want instant access to corporate data on a device of their choice anytime, anywhere.
With MobileIron Threat Defense you will fully secure both corporate and employee-owned devices so users can be more productive and mobile devices are protected against advanced threats. MobileIron’s non-intrusive approach to securing Android and iOS devices provides comprehensive protection around the clock without impacting the user experience or violating their privacy.
MobileIron Threat Defense delivers unparalleled mobile security that enables enterprises to monitor, manage, and secure devices against mobile – device, network and application (DNA) – cyberattacks. With one application, known and zero-day threats can be stopped on-device, even without network connectivity, before they cause damage. Users are not required to take any action to deploy or activate the application, and they cannot uninstall the protection. There is no disruption to their productivity, and mobile devices are prevented from impacting the corporate network and risking data loss.

Capabilities
For timely detection and remediation of device, network, and app attacks on mobile devices, enterprises can protect their company data with the MobileIron Threat Defense solution.
  • Proactive Detection of Threats and Attacks
Protect your corporate network and data against known and zero-day malicious threats with sophisticated machine learning and behavior-based detection ondevice.
  • Timely Remediation
Limit time of exposure for possible exploitation and stop zero-day attacks with policy-based compliance actions that provide alerts of risky behaviors, proactively shut down attacks on-device without network connectivity required, isolate compromised devices from your network, and remove malicious applications and their content.
  • Greater Visibility
Gain visibility and awareness into device, OS, network, and application risks, and receive actionable information to respond more quickly and effectively to threat vectors.
  • Easy Management
From one application, provide granular policy and compliance actions to easily manage corporate and employee-owned devices with automatic deployment and activation, no user action required.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
13
12
logo
Offer a reference bonus
0.00

MobileIron Access

Protecting your mobile and cloud resources from unauthorized or malicious access is one of the biggest challenges organizations face today — and password-only security is no longer up to the task. In fact, in 2018, stolen user credentials are the top cause of enterprise data breaches. In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to:
  • Establish user trust using multiple factor authentication
  • Correlate user trust with other factors such as endpoint, app, network, and more
  • Apply adaptive, risk-based policies that match the user’s environment
MobileIron Access introduces zero sign-on technology that evaluates a comprehensive set of attributes before granting access to your enterprise resources — without ever requiring a password.

Benefits Zero sign-on Verify critical signals – user, device, apps, networks, and threats – before granting access. Multi-factor authentication Replace expensive and cumbersome hard tokens with a secure MFA solution that’s easy to deploy and use. Secure your cloud Protect access to all of your critical productivity apps and services, including Salesforce, OneDrive, and more. MobileIron Access provides this new security framework so organizations can confidently adopt mobilecloud technologies to drive user productivity while reducing the risk of data breaches.
With capabilities such as multi-factor authentication (MFA), seamless single sign-on (SSO), and an advanced policy engine, organizations have the right security platform to meet the growing information security and compliance requirements.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
9
7
logo
Offer a reference bonus
1.40

MobileIron Core

The MobileIron EMM platform enables global enterprises to secure and manage modern operating systems in a world of mixed-use mobile devices. It incorporates identity, context, and privacy enforcement to set the appropriate level of access to enterprise data and services. 
... Learn more
-
ROI-calculator
Configurator
ROI-
-
2
4
logo
Offer a reference bonus
2.50

MobileIron Unified Endpoint Management (UEM)

MobileIron Unified Endpoint Management (UEM) provides the foundation for the industry’s first mobile-centric, zero trust enterprise security framework. MobileIron UEM puts mobile security at the center of your enterprise and allows you to build upon it with enabling technologies such as zero sign-on (ZSO) user and device authentication, multi-factor authentication (MFA), and mobile threat detection (MTD).

Secure workspace Enable seamless and secure access to business apps and data on every endpoint in your organization. Segregate business apps and data from personal apps and data on mobile devices. Secure mobile productivity apps including email, contacts, calendar, and tasks across multi-OS devices.

Endpoint management MobileIron Unified Endpoint Management (UEM) improves data security by taking more information signals into account before granting access to business resources. It validates the device, establishes user context, checks app authorization, verifies the network, and detects and mitigates threats before allowing access to critical resources.

Analytics Use forensics about your mobile infrastructure to proactively resolve performance issues before they impact the security of your data or end-user productivity.
... Learn more
ROI-calculator
Configurator
ROI-
-
20
5

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.