mobile data

Results 351 - 375 of 684Sort Results By: Published Date | Title | Company Name

Maximize Productivity with Secure Delivery of Applications to Mobile Devices

Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems

MDM on the Cloud

Published By: IBM     Published Date: Apr 18, 2017
Are you looking to add new data domains or solve new business problems? IBM InfoSphere MDM comprises a complete MDM suite with multi-domain MDM capabilities and built-in domain patterns. IBM offers several editions of InfoSphere MDM, each designed to integrate with your existing architectures and business processes. You can choose the platform that best meets your immediate and long-term needs.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
IBM

Measure what Matters: For mobile apps, the user experience is everything

Published By: HP Software     Published Date: Oct 20, 2015
Challenges of mobile app is dead in the water.
Tags : 
mobile apps, user experience, measurement, data, analytics, best practices, business analytics, business management
    
HP Software

mHealth Technology: Four Key Steps

Published By: Teradata     Published Date: Jun 14, 2013
Download this paper for an in-depth look at how advances in mHealth technology and the use of biometric data analytics are important to improving the overall healthcare system.
Tags : 
biometric data analysis, mobile healthcare, healthcare, mhealth, biometric data
    
Teradata

Middle East broadcaster chooses Equinix to help grow its content-on-demand business

Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management system
    
Equinix

Middle East broadcaster chooses Equinix to help grow its content-on-demand business (German)

Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management system
    
Equinix

Mobile BI: Actionable Intelligence for the Agile Enterprise

Published By: SAS     Published Date: Apr 13, 2011
BI usage among organizations with mobile BI has doubled compared to those companies that have not mobilized their BI. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : 
mobile bi, business intelligence, andrew borg, david white, aberdeen, performance management, data management, knowledge management
    
SAS

Mobile Collaboration: 7 Pitfalls to Avoid

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile collaboration is fast, efficient, and necessary. But before you spend your time and money on a solution, you’d better learn what works—and what doesn’t. Read this guide to learn what to consider, mistakes to avoid, and tips for data security.
Tags : 
mobile collaboration, secure collaboration, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, employee collaboration
    
Good Technology Corporation

Mobile Content Management

Published By: IBM MaaS360     Published Date: Jul 09, 2015
Mobile productivity necessitates instant and easy access to retrieve, edit, share and send corporate data from anywhere. In this paper we’ll explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run all business from the palms of their hands.
Tags : 
mobile content management, mobile productivity, corporate data, access, workplace productivity, smartphones, tablets, networking
    
IBM MaaS360

Mobile Content Management White Paper

Published By: VMware AirWatch     Published Date: May 19, 2016
The mobile office is a reality in today’s world. According to the Philadelphia Business Journal, telecommuting has increased more than 73 percent since 2005, meaning a burgeoning number of employees are accessing corporate documents and data on their mobile devices. In a recent IDG Enterprise survey, 82 percent of respondents reported that at least some colleagues have completed tasks from mobile devices, whether those devices are managed or not.
Tags : 
technology, telecommuting, mobile data, mobile workforce, best practices, mobile computing, mobile data systems, smart phones
    
VMware AirWatch

Mobile Content, Collaboration & IDC's 3rd IT Platform

Published By: Box     Published Date: Feb 13, 2015
IDC's 3rd IT Platform — defined by the nascent and confluent mobile, cloud, social business and big data technologies — will drive 98 % of future IT industry growth over the next seven years. In 2013, industry transition to the 3rd Platform will move from the exploration stage to full-blown high stakes competition, resetting the leadership ranks in the IT sector forever.
Tags : 
idc, it platform, mobile, mobile content, 3rd platform technologies, it management
    
Box

Mobile data security

Published By: IBM MaaS360     Published Date: Sep 27, 2016
Protecting confidential data while keeping mobile users productive.
Tags : 
ibm, mobile, mobilize, mobile data security, security, networking, wireless, enterprise applications
    
IBM MaaS360

Mobile Data Security

Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM

Mobile Data Security: Finding the Balance

Published By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : 
data security, byod, corporate security, mobile data security, user experience, security, it management, data management
    
IBM MaaS360

Mobile Data Security: Finding the Balance

Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360

Mobile Data Security: Finding the Balance

Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security
    
IBM MaaS360

Mobile Design Patterns: Push, Don't Pull

Published By: IBM     Published Date: Mar 13, 2014
When it comes to design patterns, the battle between push and pull has been ongoing since the start. Both models have their place. But the authors of this IBM® Redbooks® Point-of-View article, including IBM WebSphere® VP Jerry Cuomo, argue that in many situations, pushing data to users as it changes can consume far fewer resources than a conventional pull pattern.
Tags : 
ibm, ibm redbooks, ibm websphere, marketing, mobile, mobile marketing, mobile design, mobile applications
    
IBM

Mobile Device Management Buyers Guide

Published By: Sophos     Published Date: Jul 15, 2013
This MDM buyers guide will walk you through the process of selecting the right mobile device management solution that fits your company’s BYOD objectives. It explains how an effective MDM system can support an organization's workforce mobility strategy, ensure compliance, and provide central management of devices and apps while supporting easy administration.
Tags : 
sophos, byod, buyers guide, mobile device management, mobile device, android, windows 8, mobile
    
Sophos

Mobile Device Management for Retail

Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
ibm, retail, mobile device management, data security, android, apple, mobile, networking
    
IBM MaaS360

Mobile Device Security: Securing the Handheld, Securing the Enterprise

Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost
    
Motorola

Mobile is the Moneymaker

Published By: Akamai Technologies     Published Date: Mar 09, 2017
Is your site ready for the mobile opportunity? Mobile users buy more often and spend more money, but 75% of consumers see their mobile experience as slow. Read the Mobile is the Moneymaker infographic now to find out what mobile users expect from your e-commerce website. Compiled using data from Akamai’s recent consumer web performance expectations survey, this infographic reveals: • E-commerce engagement and spending habits for mobile consumers • Mobile consumer page load expectations • The real-world business impact of not being mobile ready • The key challenges to successful mobile experiences
Tags : 
financial services, financial data, mobile opportunity, e-commerce, mobile consumers, mobile experiences
    
Akamai Technologies

Mobile Is The New Playground For Thieves

Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM

Mobile Malware hits ActiveSync-only Devices

Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron

Mobile Malware hits ActiveSync-only Devices (in Japanese)

Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron

Mobile Marketing as Enterprise Imperative: Strategy, Not Tactic

Published By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : 
sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy
    
SDL Web Content Management Solutions
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.