mobile data

Results 76 - 100 of 684Sort Results By: Published Date | Title | Company Name

Application Modernization Is King, And Mobile Is The Heir Apparent

Published By: HPE     Published Date: Feb 11, 2015
Firms That Plan For Mobile, Cloud, Big Data, And The Impact Of Social Media Without First Taking Control Of Their Existing Application Portfolio Are Headed For Disaster.
Tags : 
    
HPE

Apps to Go: Six Keys to Delivering User-Driven Mobile Applications

Published By: HP - Enterprise     Published Date: Jun 05, 2013
In today’s mobile world, the user is at the center of the application experience. This is true whether the user is a customer, a partner, or an employee. Yet meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise.
Tags : 
applications, apps, mobile applications, mobile, user-driven, data security, internet security, mobile data systems
    
HP - Enterprise

Architecting a Flexible Strategy for Securing Enterprise Bring Your Own Device (BYOD)

Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
    
ForeScout

Are You Meeting Today's Mobile Mandate?

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : 
mobile, mobile adoption, customer loyalty, always on
    
Akamai Technologies

Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices

Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic

Banking IT Systems Management: Challenges and Solutions

Published By: Kaseya     Published Date: May 13, 2015
Banking systems are inherently distributed in multiple branch and ATM locations, as well as home banking over the internet. As the number of access points grows, so does the complexity of IT systems management. Systems need to be readily available and productive yet secure and protected from data-breach.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, finance
    
Kaseya

Baseball, BI & Netsuite

Published By: Netsuite     Published Date: Jul 24, 2017
Baseball has always collected in-game data. However, until recently, fans didn’t have easy access to the various statistics that coaches used for key decisions important for the development of the players and success on the baseball field. It’s not unlike how traditional business intelligence is delivered. Data and reports are set aside for a few experts who determine what is important for you. Today, baseball statistics are widely available during broadcasts on TV, PCs and mobile devices. Basic data displays like inning and score are enhanced with metrics meaningful to students of the game, such as pitch speed, strikeout percentages and hit zones. It’s a good example of vital information being delivered in real-time, on demand and in context.
Tags : 
    
Netsuite

Benchmarking the Enterprise Road Warrior

Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.
Tags : 
mobility, wireless, remote workers, road warrior, global roaming connectivity, mobile device, cellular data cards, vpn
    
Motorola

Best In Class Attributes For Today's Optimized IT Infrastructure

Published By: HPE     Published Date: Feb 11, 2015
Emerging technologies, like mobile, big data and cloud, lead to increasingly complex and demanding workloads that can overwhelm outdated infrastructures. But by leveraging server and management systems designed for the technologies of today, Best-in-Class organizations can easily meet these demands and gain benefits.
Tags : 
    
HPE

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing

Best Practices for Mobile Application Architectures

Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile
    
Sybase

Best Practices for Mobile Application Lifecycle Management

Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
IBM MaaS360

Best Practices for Mobile Application Lifecycle Management

Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management
    
IBM MaaS360

Best Practices for Mobile Application Lifecycle Management

Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm
    
IBM MaaS360

Best Practices for Mobile Application Lifestyle Management

Published By: IBM MaaS360     Published Date: Apr 15, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
IBM MaaS360

Beyond Prevention: Cisco’s Next Generation Endpoint Security

Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco

Beyond the Cubicle Life

Published By: Citrix ShareFile     Published Date: Jul 02, 2019
It’s no secret. Virtual work already is having a profound impact on the way employees do their jobs and deliver value. And more industries than ever imagined are jumping on the bandwagon. Read this e-book to learn more about why: • 50 percent organizations increased spending on mobile tech and virtual work over the past three years. • Oxford Economics expects that number to rise to 70 percent in the next three years • It’s not too late for you to invest in secure digital workspaces that protect data and boost employee productivity
Tags : 
    
Citrix ShareFile

Big Security for Big Data

Published By: HP - Enterprise     Published Date: Feb 06, 2013
We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data.
Tags : 
big security, big data, secure data, business technology
    
HP - Enterprise

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM

Boost your Mobile ROI with Powerful Cognitive Insights from IBM MaaS360

Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.