mobile app

Results 401 - 425 of 1380Sort Results By: Published Date | Title | Company Name

Deliver Secure, New Business Services in a Multi-Channel Customer Environment

Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies

Deliver Secure, New Business Services in a Multi-Channel Customer Environment

Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies

Application Virtualization Solution: Citrix XenApp

Published By: Citrix Systems     Published Date: Sep 17, 2015
Citrix XenApp delivers Windows apps as secure mobile services. With XenApp, IT can mobilize the business - increasing user productivity, while reducing costs by centralizing control and security of intellectual property.
Tags : 
citrix, xenapp, security, windows, app virtualization, it management
    
Citrix Systems

Device Proliferation and the Important Role of Thin Clients

Published By: Citrix Systems     Published Date: Sep 17, 2015
Embracing mobile devices, thin clients, new app delivery systems, and BYOD all represent a huge challenge to IT. The incredible amount of flexibility, productivity, and employee satisfaction that can be gleaned from the support of such initiatives is massive. However, this shift comes at a high price in terms of increased infrastructure cost and the increased complexity of managing it all.
Tags : 
mobile, thin clients, app delivery, byod, employee productivity, it management, platforms, business technology
    
Citrix Systems

Empower a Mobile Workforce with Secure App Delivery

Published By: Citrix Systems     Published Date: Sep 17, 2015
Mobility has given people new freedom to work anywhere, on any device—but it has also added new complications for IT. Learn how Citrix XenApp helps people be productive on any device.
Tags : 
mobility, it management, citrix, wireless, platforms
    
Citrix Systems

Taking Windows Mobile on Any Device

Published By: Citrix Systems     Published Date: Sep 17, 2015
Taking Windows applications and desktops mobile has many advantages, but the process of identifying a single solution is complex. Learn how Citrix XenApp solves this complex problem.
Tags : 
windows, citrix xenapp, mobile, it solutions, software development, it management, wireless
    
Citrix Systems

Top Use Cases for App Virtualization (Webinar .mp4)

Published By: Citrix Systems     Published Date: Jan 26, 2016
Attend this webinar to learn about the top app virtualization use cases, complete with real-world customer examples. We’ll also discuss the key differences between the new app virtualization capabilities of VMware Horizon and Citrix XenApp.
Tags : 
vmware, citrix, xenapp, mobile, app virtualization, productivity, it management, wireless
    
Citrix Systems

Maximize Productivity with Secure Delivery of Applications to Mobile Devices

Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems

Mozilla Scales MySQL-based Mobile App Store

Published By: Scalebase     Published Date: Mar 08, 2013
Learn how Mozilla is able to cost-effectively scale out their new Firefox mobile operating system App Store (running MySQL) to an infinite number of users, while increasing performance.
Tags : 
mozilla, scalebase, performance, app store, increasing performance, infinite number of users, increasing performance, shard
    
Scalebase

Meeting the Needs of the Mobile-First Consumer

Published By: LivePerson     Published Date: May 17, 2016
At the end of last year, the US alone had 435 million smart mobile devices in use — that’s 35% higher than the total US population. Among smartphone users, 68% use messaging apps regularly. And 84% of smartphone engagement with apps is spent communicating via text, email, and social channels. What does this mean for brands? The current state of CX is broken. Brands focus too much on channel and transaction, ignoring the customer’s preferences, and, ultimately, negatively affecting their bottom line. But wherever there’s a disconnect, there’s also opportunity. In increasing numbers brands are turning to messaging platforms and apps to offer more efficient, convenient customer service.
Tags : 
liveperson, idc, consumer relations, mobile, smartphones, mobile apps, brand engagement, mobile computing
    
LivePerson

3 Ways Text Messaging Exposes Financial Services Firms to Massive Risk

Published By: Smarsh     Published Date: Dec 07, 2016
Text messaging is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier, making it very appealing to financial advisors and their customers. However, if used for business communications, texts can create tremendous risk. Less than a third of financial firms have a text supervision solution in place according to the Smarsh 2016 Electronic Communications Compliance Survey, the largest compliance gap facing financial firms today. Text messaging can’t be ignored by firms any longer.
Tags : 
    
Smarsh

Banking and the Connected Customer

Published By: Salesforce.com     Published Date: Jul 02, 2014
A well-executed "System of Engagement" strategy provides value to banks and customers. • Approximately 45% of bank customers today regularly interact with their institution through a mobile channel, with estimates of 70% within a few years. • Why it’s time to break down the System of Record and move to a System of Engagement. • How this shift can increase customer satisfaction and create new business opportunities. Download this white paper to get the full details on how a new approach to banking pays off for everyone.
Tags : 
salesforce, system of engagement, banking, increase customer satisfaction, mobile channel, system of record, knowledge management, enterprise applications
    
Salesforce.com

The Future of IT: From Chaos to Service Automation

Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps
    
ServiceNow

Don’t Settle for Intune: Choose the Leader in Complete Enterprise Mobile Security

Published By: MobileIron     Published Date: Mar 21, 2017
As organizations increasingly use Office 365 and other cloud services on mobile devices, they need a secure mobile and cloud architecture to protect all of these apps and data on the device and in transit. It requires a comprehensive, unified approach to enterprise mobility management (EMM) that includes defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated Windows 10 desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron

The Leading IT Platform to Secure and Manage Mobile Devices, Desktops, Apps and Content

Published By: MobileIron     Published Date: Mar 02, 2018
Enable Business Transformation with MobileIron EMM
Tags : 
    
MobileIron

Eight Components Of A Successful BYOD Strategy

Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data
    
MobileIron

Securing MacOS In The Modern Work Era

Published By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : 
macos, modern, work, era, devices, workforce, organizations
    
MobileIron

Five Steps To Executing A Mobile Threat Defense Strategy

Published By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : 
mobile, threat, defense, security, mobileiron, cyber, criminal
    
MobileIron

Global Threat Report Q4 2017

Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron

Cloud Best Practices: Audit Checklist for Endpoint Security

Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron

Securing Office 365 with MobileIron

Published By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron

The Criminal Justice Information Services (CJIS) Compliance For Mobile Devices

Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron

Five Steps To Executing A Mobile Threat Defense Strategy

Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.