mobile it strategy

Results 1 - 25 of 147Sort Results By: Published Date | Title | Company Name

Mobify’s Mobile Solution Checklist

Published By: Mobify     Published Date: Apr 17, 2015
Choosing the right mobile solution (and solution provider) is a complex undertaking – and asking the right questions is critical in helping you find your best fit. In order to determine your ideal mobile solution, it’s important to understand what your needs are, what a given solution offers and how the two might intersect. In this workbook, we’ve presented the most commonly referenced mobile solution criteria for retailers in 2015. For the purposes of this guide, we’ve defined mobile solution providers as companies that bring together a productized mobile technology platform with creative and strategy services that are focused on improving mobile metrics. You can use this criteria to validate different solution providers, and can download included template to customize it for your business’ unique needs.
Tags : 
mobile solutions, mobify, mobile solution criteria, mobile technology platforms, mobile metrics
    
Mobify

The Anatomy of Today's Mobile Organization

Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
    
Lenovo and Intel®

Mobile Technology That Makes a Difference

Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Extreme productivity with X1 mobility: executing your mobile strategy has never been easier! With ThinkPad X1 mobile devices, employees get the freedom to work anywhere with uncompromising performance. And, IT can ensure the devices are extremely secure, easy to maintain, and built to last. Get more details on the Lenovo X1 in this guide!
Tags : 
lenovo, mobile technology, thinkpad x1, thinkpad x1 mobile, extreme productivity, mobile strategy, secure it, x1 mobility, lenovo x1
    
Lenovo and Intel®

The Next Mobile Decade

Published By: Adobe     Published Date: May 04, 2018
Mobile capabilities have grown up. Strategies should, too. Over the last ten years, smartphone usage among adults has grown to 95 percent. Surprisingly, 90 percent of marketers say they’ve only had a mobile strategy for five years or less. Read The Next Mobile Decade: Adobe 2018 Mobile Maturity Study, and learn: - How 500 marketing and IT professionals tackled mobile marketing last year - Which mobile strategies the most advanced organizations put into practice - What you can do to make your brand a mobile leader in the next decade Fill out the form to get the report.
Tags : 
    
Adobe

A Billion Mobile Sites Spark No Joy

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : 
mobile, app, web design, media
    
Akamai Technologies

A 3-Step Plan for Mobile Security

Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy, security, it management, data management, business technology, data center
    
Websense

5 Ways Mobile Apps Are Driving the Store of the Future

Published By: MicroStrategy     Published Date: Sep 09, 2014
Improve revenue, loyalty, and productivity while controlling costs. It’s a given: Most shoppers are now armed with a mobile device when they enter a retail store. They are highly informed and expect retail employees they interact with to be at least, if not more knowledgeable about a store’s products, promotions, and services. This white paper outlines the 5 key benefits of a winning mobile app strategy, including new ways retailers can effectively leverage mobile technology as a competitive advantage. With the average shopper looking at their phone more than 150 times a day, learn how leading retailers leverage mobile technology to: Enhance customer experience Drive sales Boost customer loyalty Achieve operational efficiencies Download this white paper to find out how retailers with a powerful, effective mobile app program in place can win the battle for shoppers’ eyes and ears — and wallets.
Tags : 
mobile apps, customer experience, customer loyalty, operational efficiencies, mobile technology, sales lift, customer loyalty, best practices, mobile workers, smart phones, wireless phones, customer interaction service, customer relationship management, customer satisfaction, customer experience management
    
MicroStrategy

Four Pitfalls Hindering Mobile App Success

Published By: OutSystems     Published Date: Mar 18, 2015
In this white paper we describe the top four issues that cause mobile projects to fail and outline a path that can take you safely around these common pitfalls and put you on track to delivering a powerful, flexible mobile application strategy.
Tags : 
application development, mobile app development, mobile app pitfalls, a guide to mobile app success, application performance management, best practices, research
    
OutSystems

GMobile App Developed with the MicroStrategy Mobile App Platform

Published By: MicroStrategy     Published Date: Aug 24, 2012
Guess GMobile app, developed using the MicroStrategy Mobile App Platform, instantly delivers up-to-the-minute operational information to their employees via the iPad.
Tags : 
microstrategy, guess, gmobile app, platform, business technology
    
MicroStrategy

Forbes Insights: How Apps are Engaging Customer, Partners and Employees

Published By: Adobe     Published Date: Feb 20, 2014
Adobe collaborated with Forbes Insights on this study in order to shed light on new mobile engagement opportunities: How are companies using apps, whether they are aimed at customers, employees or partners? What are the lessons learned so far? And what are best practices for using mobile and tablet apps?
Tags : 
forbes, adobe, mobile marketing, mobile applications, apps. mobile apps, digital marketing, customer engagement, marketing strategy, content management
    
Adobe

MobileIron Mobile Maturity Assessment

Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron

Leveraging New Opportunities in the Era of Enterprise Mobility

Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch

Securing Productivity in the Borderless Enterprise

Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology, business intelligence, business management
    
Microsoft

Gartner Advice: Say yes to Consumerisation, Security Strategies Revealed

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.

The Secrets to Data Protection on Mobile Devices Revealed

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.

Key Authentication Considerations for Your Mobile Strategy

Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, mobile computing, wireless security, mobile device management
    
CA Technologies

Key Authentication Considerations for Your Mobile Strategy

Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, mobile computing, wireless security, mobile device management
    
CA Technologies

The Ultimate IT Director Guide to iOS 8 in the Enterprise

Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron

Top 4 iOS 8 Recommendations for IT Directors

Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron

Gartner Application Security Testing Magic Quadrant 2015

Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
    
Veracode

Create A Mobile-Ready Customer Service Strategy

Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
Mobile is undoubtedly changing both our personal and professional lives. Customer service organizations should decide on a strategy to bridge the gap between mobile behavior and customer service. This requires a strategic review of value drivers, combined with a tactical search for relevant use cases. Don’t fall in the “we need an app for everything” trap — some users need big screens, some users don’t. Some need a rich experience, others just need basic functions. Your strategy must take all of these dynamics into consideration.
Tags : 
data search, mobile devices, customer service, organization optimization, employee expectations, opportunities, global oracle data centers, data center traffic, customer interaction
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017

Mobile Testing: Guide for Modern Marketers

Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
As you likely know, mobile testing is the art and science of building, running, and analyzing optimization tests for mobile customer experiences. What you may not know, like many marketers, is how to do mobile testing really well. It starts with a solid mobile marketing strategy and ends with an effective mobile experience. Download this guide for the best advice from analysts, engineers, and thought leaders on how to help mobile-minded businesses master the non-desktop landscape.
Tags : 
    
Oracle Marketing Cloud

Why your Mobile App "Strategy" is Killing your Business

Published By: Swrve     Published Date: Mar 07, 2016
This whitepaper highlights if your mobile app strategy is killing your business and how to calculate the ROI to fix it.
Tags : 
mobile app, roi, return of investment, mobile app strategy, mobility, roi calculation, mobile computing, mobile data systems, mobile workers, smart phones, application integration, return on investment
    
Swrve

Customer Experience Strategy: Meeting Expectations and Changing Dynamics in Service

Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology, knowledge management, data management, business technology
    
Salesforce.com

Five Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Feb 21, 2017
This paper provides guidance for selecting and purchasing a digital workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Download this whitepaper to access recommendations for the most critical specifications to help you in defining an effective digital workspace strategy for your environment.
Tags : 
    
VMware AirWatch
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.