mobile data

Results 226 - 250 of 682Sort Results By: Published Date | Title | Company Name

IDC: The Business Value of HP BladeSystem White paper

Published By: HP     Published Date: Feb 02, 2015
Customers across all industries are transitioning to the 3rd Platform, where IT organizations are seeking to leverage mobile, social, cloud, and big data solutions to drive business value. At the same time, the pace at which the business operates is continually accelerating.
Tags : 
    
HP

A SOLID DATA CENTER STRATEGY STARTS WITH INTERCONNECTIVITY

Published By: Equinix     Published Date: Oct 27, 2014
Connections are great. Having a network to connect to is even better. Humans have been connecting, in one form or another, throughout history. Our cities were born from the drive to move closer to each other so that we might connect. And while the need to connect hasn’t changed, the way we do it definitely has. Nowhere is this evolution more apparent than in business. In today’s landscape, business is more virtual, geographically dispersed and mobile than ever, with companies building new data centers and clustering servers in separate locations.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer, networking
    
Equinix

Gartner Magic Quadrant for Mobile Data Protection

Published By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrants offer visual snapshots, in-depth analyses and actionable advice that provide insight into a market's direction, maturity and participants.
Tags : 
data protection, mobile, security, storage management, encryption, best practices
    
Intel Security

Don’t Settle for Intune: Choose the Leader in Complete Enterprise Mobile Security

Published By: MobileIron     Published Date: Mar 21, 2017
As organizations increasingly use Office 365 and other cloud services on mobile devices, they need a secure mobile and cloud architecture to protect all of these apps and data on the device and in transit. It requires a comprehensive, unified approach to enterprise mobility management (EMM) that includes defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated Windows 10 desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron

Eight Components Of A Successful BYOD Strategy

Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron

Five Steps To Executing A Mobile Threat Defense Strategy

Published By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : 
mobile, threat, defense, security, mobileiron, cyber, criminal
    
MobileIron

The Ultimate Guide to BYOD

Published By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : 
guide, byod, mobility, landscape, organization, program, mobile
    
MobileIron

The Criminal Justice Information Services (CJIS) Compliance For Mobile Devices

Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron

Five Steps To Executing A Mobile Threat Defense Strategy

Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron

MobileIron AppConnect and AppTunnel

Published By: MobileIron     Published Date: Oct 29, 2018
Advanced security for mobile apps and data
Tags : 
    
MobileIron

Email+ Enhances PIM Security and Preserves the Native App Experience

Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron

MobileIron Access: A simple and smart security platform for the enterprise cloud

Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron

MODERN FINANCE IN THE DIGITAL AGE: PLAN AND PREDICT BEST PRACTICES

Published By: Oracle EPM     Published Date: May 11, 2015
No matter how you define it, cloud, social, mobile, and big data are changing the competitive dynamics of the global economy and creating significant value for companies that know how to create business models leveraging these technologies.
Tags : 
finance, investment, big data, cloud computing
    
Oracle EPM

The Rising Value of APIs

Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management, application integration, application performance management, best practices, business activity monitoring, business intelligence, business management, content integration, content management system
    
MuleSoft

7 Steps to Building Your API Blueprint

Published By: MuleSoft     Published Date: Apr 13, 2016
APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. Read this eBook to learn: -how to define the business objectives that APIs will help achieve -best practices to design, manage, and deploy APIs -monitor and measure the impact of your APIs
Tags : 
digital infrastructure, data, data sharing, best practices, data management, application management, enterprise applications, network management, content management system, infrastructure, infrastructure management
    
MuleSoft

Comprehensive Data Security In The Cloud

Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Buyer's Guide to Mobile Application Platforms

Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms, mobile computing, mobile data systems, mobile workers, wireless application software
    
IBM

A Deep Dive into Offline-First with PouchDB and IBM Cloudant

Published By: IBM     Published Date: Nov 30, 2016
Covering both mobile and Internet of Things (IoT) use cases, this deep dive into offline first explored several patterns for using PouchDB together with Cloudant, including setting up one database per user, one database per device, read-only replication, and write-only replication.
Tags : 
ibm, cloud, offline-first, pouchdb, ibm cloudant, enterprise applications, cloud computing, business technology
    
IBM

VM-Series for AWS Hybrid Cloud Deployment Guidelines

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Cloud-first development initiatives, the need to deliver your applications and services to an exploding number of mobile devices and the ongoing need to accomplish more with less is driving a data center transformation that increasingly includes the public cloud.
Tags : 
palo alto, vm-series, hybrid cloud, security, security challeneges
    
Palo Alto Networks

Cloud Object Storage Helps Banks Succeed As They Hurtle Into The Data-Driven Future

Published By: IBM     Published Date: May 22, 2017
Only a handful of industries have been transformed by the digital age the way banking has. Internet and mobile banking, digital wallets, and a raft of new and innovative products have redefined “the bank” from a local, brick-and-mortar branch to an anytime-anywhere process. The new banking environment has opened opportunities for national, regional, and community banks alike, which are no longer constrained to serve only customers located in the areas where they maintain a physical branch presence. But it has also brought challenges associated with collecting, processing, analyzing, storing, and protecting vast amounts of new data, from multiple locations and sources.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM

Transition To The Cloud Your Way With IBM DB2

Published By: IBM     Published Date: May 23, 2017
Flexible deployment options, licensing models help take the challenges out of change. As you move toward the cloud, you're likely planning or managing a mixed environment of on- premises and on- cloud applications. To help you succeed in this transition, you need a trans-formative, mixed-workload database that can handle a massive volume of data while delivering high performance, data availability and the flexibility to adapt respond to business changes.
Tags : 
cloud applications, mobile optimization, web-based applications, data availability, ibm, db2
    
IBM

A Smarter Process Approach to Accelerating Customer Engagements with Mobile and Social

Published By: IBM     Published Date: Oct 19, 2017
The Smarter Process platform is IBM’s solution for reinventing business operations in a way that infuses every process with intelligence and expertise to deliver greater customer centricity, which in turn fuels top-line growth. It incorporates Business Process Management, Case Management, Operational Decision Management and Process Analytics, along with Process Discovery and Design with an objective of ensuring that customers find it easy to do business and that every interaction includes positive touch points. Within the context of this new imperative, accessing cloud efficiencies, leveraging mobile for greater engagement, mining big data for insights, and enhancing customer relationships via social media, are proving to be critical and interrelated strategies.
Tags : 
customer engagement, mobile, social, bpm, case management
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.