mobile app

Results 576 - 600 of 1385Sort Results By: Published Date | Title | Company Name

Digital Engagement Planner

Published By: Moxie     Published Date: Feb 08, 2018
Achieve your goals by successfully mapping common sources of customer struggle to the right engagement opportunities. With ever changing customer expectations and behaviors in the new Guided Economy, Crate and Barrel decided to build a competitive advantage to improve customer experience, engagement, and acquisition across mobile and desktop shoppers. By mapping struggle to engagements, digital channels are used to help shoppers select the right products, complete orders, or process payment transactions in a PCI-compliant environment.
Tags : 
customer, opportunities, engagement, planner, digital, templates
    
Moxie

It's Time to Rethink Data Security

Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint

Rethinking Data Security with a Risk-Adaptive Approach

Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint

Next Gen Your Data Protection

Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint

7 Guidelines for Hyper-Availability in the Digital Financial Services Enterprise

Published By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
    
Veeam '18

Robot Tellers and the Future of Banking

Published By: Intel     Published Date: Mar 19, 2019
Technology has drastically transformed the banking industry and the way in which consumers transact. Mobile banking is now the new normal. Many consumers, especially millennials prefer to do most if not all of their financial transactions via smartphone due to the convenience in which it offers. Even so, the popularity of mobile banking does not imply that the end of retail banking is near as research has shown that consumers still prefer retail banking for complex services such as loan applications, new account openings and advisory services. Download the whitepaper to learn— • How to build a bank of the future by leveraging the Internet of Things • How to increase security, ease system management and reduce operational costs • The benefits of migrating to a thin-client infrastructure and going paperless
Tags : 
    
Intel

API Strategy & Architecture eBook

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
    
CA Technologies EMEA

Strategie und Architektur mit APIs: Ein koordinierter Ansatz

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API-Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA

Build Secure MFA

Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta, security, it management
    
Okta

5 Steps to Successful Mobile Expense Management

Published By: CCMI     Published Date: Jul 20, 2011
Telecom expense management is a critical and well-established discipline that has grown to encompass the challenging problem of mobile device and cost management. And now there's a simple, self-service approach to successful mobile expense management (MEM) that is simple to implement and demonstrates immediate results.
Tags : 
xigo, ccmi, mem, mobile expense management, voice report, telecom expense management, tem, mobile device management, mobility management, mobile computing, mobile workers, enterprise resource planning, it spending, total cost of ownership, spend management, financial management, expense management
    
CCMI

Service Virtualization for Dummies

Published By: IBM     Published Date: Oct 02, 2015
The book covers the following topics and more: - Understand the changing relationship between IT and business — quicker delivery is required - Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. - Discover how to begin with service virtualization — build your business case. - Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, efficiency, testing processes, testing, mobile applications, web applications, middleware, packaged apps, databases, security, it management, enterprise applications, business technology
    
IBM

The Future of Testing: Where Do Testers Spend Their Time?

Published By: IBM     Published Date: Oct 02, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
testing, ibm, release cycles, testing services, applications, development, web-based applications, mobile applications, software development, it management, enterprise applications, business technology
    
IBM

Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam, identity management, password management, security management, cloud computing
    
F5 Networks Inc

F5 Synthesis: Applications without Constraints

Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud, mobile, application deployment, application delivery, networking, platforms, application performance management, cloud computing, infrastructure
    
F5 Networks Inc

Four Ways to Satisfy the Modern User – Without Losing Your Sanity

Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy, customer relationship management, customer satisfaction, business intelligence
    
Cherwell Software

The Perimeter: An Identity Crisis

Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue. Think of all the passwords you keep track of for your personal needs—your mobile banking app, your Gmail, your Facebook account, your Amazon Prime… the list goes on. Best practices tell us that we should use a unique and complex password for every service, but due to increased cloud adoption—enabling anytime access to applications from any device—users lean toward convenient but risky password practices.
Tags : 
    
F5 Networks Inc

The 2010 Handbook of Application Delivery

Published By: Arcserve     Published Date: Jul 26, 2010
The Emergence of the Application Delivery 2.0 Era: The primary goal of this handbook is to help IT organizations plan for that transformation.
Tags : 
ca technologies, application delivery 2.0 era, virtualization, mobile workforce, cloud computing, network, application optimization, managed service providers, msp, storage virtualization, mobile computing, mobile workers, server virtualization, content delivery
    
Arcserve

The Future of Mobile Selling — Getting More from your CRM

Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact

A practical guide to optimizing the care pathway for hospitals

Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE

Demo: Absolute Manage Mobile Device Management

Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

Cloud-Based Authentication Buyer’s Guide – Helping you Navigate the Possibilities

Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard

Forrester Findings: Modern Authentication Methods that Protect and Enable

Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard

Definitive Guide to Mobile

Published By: Marketo     Published Date: Jun 26, 2015
In this comprehensive, 150+ page guide, we cover topics from creating a cross-channel mobile marketing strategy, to marketing via SMS and MMS, to creating a mobile app. Loaded with checklists, charts, and thought leadership from mobile marketing experts, The Definitive Guide to Mobile Marketing will teach you how to create a strategic mobile marketing plan and engage your audience effectively via mobile devices.
Tags : 
marketing, mobile, strategic, responsive design, measurement, optimization
    
Marketo

Web Acceleration 2.0: Now No One Has to Wait

Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The demand for (and benefits of) web-based interfaces combined with an increasingly mobile and distributed workforce has exposed inefficiencies inherent in the browser, the network and its protocols, and the data center. These inefficiencies create performance problems for applications that continue to be magnified by emerging technologies like Web 2.0 and SOA. This White Paper details how F5's approach to Application Delivery Networking eliminates the bottlenecks inherent in browsers, in the network, and in the data.
Tags : 
web acceleration 2.0., web-based interfaces, data center, soa, service-oriented architecture, application delivery networking, enterprise applications, data management, service oriented architecture
    
F5 Networks Inc
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.