mobile app

Results 526 - 550 of 1388Sort Results By: Published Date | Title | Company Name

Three questions every Mobile leader needs to ask (and answer) about their mobile apps

Published By: IBM     Published Date: Jul 07, 2016
Join IBM Mobile Analytics expert, Michael Darden, to see how the analytics capabilities of IBM MobileFirst Platform can enable you to answer three critical questions about your apps and then take immediate action to correct any value-draining issues … faster than your clients can take matters into their own hands.
Tags : 
ibm, mobile, mobile applications, app development, mobile computing, mobile data systems, mobile workers, wireless application software
    
IBM

Controlling the Uncontrollable

Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management, business intelligence, business management, productivity
    
Microsoft

Securing Productivity in the Borderless Enterprise

Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology, business intelligence, business management
    
Microsoft

Six Steps to Control the Uncontrollable

Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft

Why Good Apps Are Not Good Enough

Published By: IBM     Published Date: Jul 06, 2016
Why good mobile apps are not good enough: Measure and move your mobile app to greatness
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, networking, mobile computing
    
IBM

Magic Quadrant for Web Content Management

Published By: IBM     Published Date: Jul 06, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandisers all now view WCM as mission-critical.
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, it application, wcm
    
IBM

Endpoint Data Protection: A Buyer’s Checklist

Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault

Endpoint Data Protection: A Buyer’s Checklist

Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault

Going Mobile

Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault

Beautiful Apps and Rapid App Dev

Published By: Adobe     Published Date: Jul 04, 2016
Mobile apps are a core – and essential – component of the modern digital experience. Whether the organization is a consumer-facing brand, a B2B leader, or an enterprise seeking to enhance employee productivity, well-designed mobile apps that deliver a great user experience play a unique role in building engagement.
Tags : 
mobility, mobile apps, customer engagement, app, mobile apps, mobile computing, smart phones
    
Adobe

Best practices for mobile application lifecycle management

Published By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : 
ibm, mobile, mobile applications, application lifecycle, security, mobile computing, mobile data systems, mobile workers
    
IBM MaaS360

The State of Mobile Application Insecurity - Ponemon Institute Research Report

Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless
    
IBM MaaS360

Enterprise Mobility Management

Published By: IBM MaaS360     Published Date: Jun 30, 2016
The Big Bang Theory – how Mobile Device Management exploded to include devices, apps and content
Tags : 
ibm, mobile, enterprise mobility management, mobile device management, enterprise applications, mobile computing, mobile data systems, mobile workers
    
IBM MaaS360

IBM Enterprise Mobility Survival Guide

Published By: IBM MaaS360     Published Date: Jun 30, 2016
IBM Enterprise Mobility Survival Guide: Surviving in the mobile jungle
Tags : 
ibm, mobile, management, guide, app development, mobile computing, mobile data systems, mobile workers
    
IBM MaaS360

IT Guide for Mobility: Making the Case to Business Leaders

Published By: Cisco     Published Date: Jun 21, 2016
Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions.
Tags : 
    
Cisco

Magic Quadrant for the CRM Customer Engagement Center

Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega

Magic Quadrant for the CRM Customer Engagement Center

Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega

Mobility Services: Do More By Doing Less

Published By: CDW     Published Date: Jun 14, 2016
Mobile devices and apps have transformed the way enterprises operate in recent years, improving productivity, communication and collaboration, and in many cases completely changing how work gets done. To help optimize mobility initiatives, many organizations turn to trusted IT partners that can help maintain mobile deployments and free up staff to focus on innovation.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity, mobile computing
    
CDW

Three Steps to Securing Software Patches Vulnerability Intelligence Matters

Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
    
Flexera

Redefine Windows 10 Management

Published By: VMware AirWatch     Published Date: Jun 13, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
best practices, business optimization, business management, enterprise management, business intelligence, business process automation
    
VMware AirWatch

Windows 10 Mobile: The Right Choice for Business Mobile Device Management

Published By: Microsoft Nokia Lumia     Published Date: Jun 08, 2016
Organizations' users increasingly depend on their mobile devices, but phones and tablets bring new and unfamiliar challenges for IT departments. IT must be able to deploy and manage mobile devices and apps quickly to support the business while balancing the growing need to protect corporate data because of evolving laws, regulations, and cybercrime.
Tags : 
    
Microsoft Nokia Lumia

The Definitive Guide To Mobile Marketing

Published By: Marketo     Published Date: Jun 06, 2016
In this comprehensive, 150+ page guide, we cover topics from creating a cross-channel mobile marketing strategy, to marketing via SMS and MMS, to creating a mobile app. Loaded with checklists, charts, and thought leadership from mobile marketing experts, The Definitive Guide to Mobile Marketing will teach you how to create a strategic mobile marketing plan and engage your audience effectively via mobile devices.
Tags : 
marketo, mobile marketing, mobile, cross-channel marketing, marketing optimization
    
Marketo

Course Apps: An NMC Horizon Project Strategic Brief

Published By: Adobe     Published Date: Jun 01, 2016
This report explores the evolution of the key features of course apps mobility, interactivity, engaging design, and integrated analytics — and showcase how course apps are sparking new thinking in higher education about the next iteration of digital learning resources.
Tags : 
education, mobility, mobile applications, apps, course apps, mobile applications, interactivity, apps for education
    
Adobe

Insiders are Still the Weakest Link in your Data Security Chain

Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software
    
Absolute Software

VMware AirWatch® prend en charge Office 365

Published By: VMware AirWatch     Published Date: May 25, 2016
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par VMware AirWatch® ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. VMware AirWatch apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : 
airwatch, best practices, competitive advantage, productivity, business analytics, business integration, business intelligence, business management
    
VMware AirWatch
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.