mobile data

Results 51 - 75 of 704Sort Results By: Published Date | Title | Company Name

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft

Addressing NIST and DOD Requirements for Mobile Device Management

Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging, web service security, vulnerability management, mobile device management, data loss prevention
    
IBM MaaS360

Addressing NIST and DOD Requirements for Mobile Device Management

Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security, networking, security, wireless, business technology
    
IBM MaaS360

Addressing NIST And DOD Requirements for Mobile Device Management (MDM)

Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM

Addressing User Data Risks In A Distributed Data World

Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
    
Druva

Adopting Omnichannel in Your Business - Enhancing Experience and Achieving Operational Excellence

Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson

Adsquare case study

Published By: HERE Technologies     Published Date: Sep 26, 2018
Mobile has become the first screen for consumers in terms of internet time spent. Hyperlocal location data is unique to mobile and provides a lot of new, valuable information about consumers. Today’s sophisticated buyers demand more transparency in location data science, better campaign performance and ROI from attribution modeling. Finding the right partner that can help build the bridge between real-world consumer behavior and mobile programmatic advertising in a transparent way is essential. To meet those challenges and address the demand for top quality location data, adsquare integrated a global database of HERE Places in April 2017. By leveraging HERE Places and overlaying raw location data of anonymous users with POI data points, adsquare is able to understand exactly what consumers are doing in the real world: what places they visit, when and how often. To find out more download this paper today.
Tags : 
    
HERE Technologies

Agility Without Compromise with Juniper SDN

Published By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks

AIIM Trendscape: The New Mobile Reality

Published By: Box     Published Date: Jun 19, 2014
This AIIM Trendscape report has in-depth interviews of 50 senior end users and industry leaders, highlights expert recommendations to maximize mobile opportunities within the enterprise and offers a 7-point mobile action plan that organizations can execute in the next 12 months. Obtain access to data, expert opinions and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing issues that are not readily apparent in existing coverage about mobile technologies.
Tags : 
box, aiim, mobile opportunities, mobile first, mobile technologies, applications, it management, enterprise applications
    
Box

All Clouds Are Not Created Equal

Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

All Clouds Are Not Created Equal

Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

All Clouds Are Not Created Equal

Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

All Clouds are not Equal

Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

Amélioration du Cycle de Vie Mobile

Published By: Adobe     Published Date: Apr 25, 2016
In this paper we look at the old model of managing apps and then see if there’s a better way.
Tags : 
mobile apps, mobile lifecycle, data management
    
Adobe

Analyst Report: Gartner Magic Quadrant for Enterprise Mobility Management 2015

Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this report, read about how AirWatch by VMware provides EMM suites to help organizations integrate mobile devices into their security framework, and provides tools for easier auditing and reporting, provisioning, support, data defense.
Tags : 
airwatch, security, data defense, mobile, emm, it management, business technology
    
VMware AirWatch

Android em Serviços de Entrega e Logística

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies

Android en Logística y Servicios de Envío

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies

Android en Manufactura

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies

Android na Manufatura

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies

Answers to Your Mobile Device Data Protection Questions

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.

API Monetization: Unlocking the Value of Your Data

Published By: CA Technologies     Published Date: Aug 22, 2017
The application economy has forced businesses to transform. To capture new growth opportunities, enterprises are opening up and sharing select data and applications with developers, partners, mobile devices, the cloud and the Internet of Things (IoT). One of the byproducts of this transformation is the discovery that legacy data has value in the application economy—so much so that new revenue opportunities emerge as this data is used in new ways.
Tags : 
    
CA Technologies

API360: The Complete API Strategy Model for the Enterprise

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth. Among the most promising objectives of such a strategy are: • Providing superior digital experiences for consumers though mobile • Expanding markets and revenue streams through multiple channels • Connecting employees and partners to enterprise data anywhere, anytime • Launching innovative new services for the Internet of Things (IoT) Successfully executing a digital strategy requires the ability to launch new apps and coordinate your digital presence with partners. Application Programming Interfaces (APIs) create the connectivity required to share enterprise data and digital content with those apps and partners over the Internet. APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your dat
Tags : 
    
CA Technologies EMEA

APIs: The New Marketing Platform

Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your company’s digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of today’s API-powered digital businesses. What’s inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
    
Google Apigee APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.