mobile data

Results 226 - 250 of 683Sort Results By: Published Date | Title | Company Name

Forrester research: Empowering Workforces With Mobile Work Styles And Client Virtualization

Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees, application integration, application performance management, workforce management, business technology
    
HP and Intel ®

Forrester: Rethink Enterprise Endpoint Security In The Cloud Era

Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

Free Template: Mobile Engagement RFP

Published By: Urban Airship     Published Date: Oct 18, 2017
FIGHT THE FOMO! MAKE SURE YOU CHOOSE THE RIGHT MOBILE ENGAGEMENT VENDOR You've been tasked with evaluating mobile engagement vendors. Now what? Be sure you’re asking the right questions. We’ve gathered questions 14 key areas to ask vendors based on a few data sets — high-level thoughts from analyst firms like Forrester, the best questions prospective customers ask us, what we wish customers in certain verticals would ask, and more. It's thorough and it’ll give you a solid, informed place to start. Download the RFP template and get: ? A comprehensive list of 150+ questions in 14 key areas — and the business reasons behind asking them ? Recommendations for vertically-specific questions to ensure you’re including what’s most critical to getting your needs met
Tags : 
    
Urban Airship

Free white paper: “Revolutionizing the Professional Services relationship with Time”

Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data
    
Intapp

Frost & Sullivan Innovation Report: 2015 Global Next-Gen Enterprise Mobility Solutions

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure, ip networks, network security, access control
    
Citrix Systems, Inc.

Fuel mobile collaboration. Secure data & privacy. Download whitepaper.

Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology

Full API Lifecycle Management

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA

Gartner 4 Mobile Security Insights for CISOs

Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout

Gartner Application Security Testing Magic Quadrant 2015

Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
    
Veracode

Gartner Magic Quadrant for Mobile Data Protection

Published By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrant for Mobile Data Protection
Tags : 
mobile data systems, wireless infrastructure, business intelligence
    
Intel Security

Gartner Magic Quadrant for Mobile Data Protection

Published By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrants offer visual snapshots, in-depth analyses and actionable advice that provide insight into a market's direction, maturity and participants.
Tags : 
data protection, mobile, security, storage management, encryption, best practices
    
Intel Security

Gartner Magic Quadrant for Mobile Marketing Platforms, July 2018

Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119

Get More Out of Existing Data Centers and Pay Less for Cooling Power

Published By: IBM     Published Date: Apr 23, 2008
Data center managers are finding that high-density equipment causes problems such as hotspots and rising cooling costs. In this video, IBM explains how to address green technology issues by getting more out of existing facilities, and then describes an IBM solution that can greatly reduce the energy and power consumption of your data center.
Tags : 
mobile measurement, cooling, cool, data center, heat, power, energy efficiency, ibm
    
IBM

Going Beyond Page Load Speed: How T-Mobile mastered digital performance to boost ROI

Published By: Dynatrace     Published Date: May 20, 2016
This report details how T-Mobile did exactly that, and how you can do the same: - Base your plan on your own business and visitor data - Correlate performance to transaction completion rate - Determine where you'll see the most return for your technology and time investment
Tags : 
dynatrace, software development, devops, tmobile, digital performance, speed, knowledge management, enterprise applications
    
Dynatrace

Going Beyond Page Load Speed: How T-Mobile mastered digital performance to boost ROI

Published By: Dynatrace     Published Date: Apr 26, 2017
It's impossible to optimize every page and action of every transaction for every device and user location...you need to identify the pages and actions that matter most and build an optimization plan. This report details how T-Mobile did exactly that, and how you can do the same: Base your plan on your own business and visitor data Correlate performance to transaction completion rate Determine where you'll see the most return for your technology and time investment Download the report to read more.
Tags : 
digital experience, digital experience monitoring
    
Dynatrace

Going Mobile

Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault

Good Mobile Intranet Data Sheet

Published By: Motorola     Published Date: Feb 05, 2008
Get an overview of how Good™ Mobile Intranet can put the power of your intranet and mobile applications on your fleet of handhelds.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications, mobile computing
    
Motorola

Good Mobile Messaging

Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good, wireless communications
    
Motorola

Good Mobile Messaging Data Sheet

Published By: Motorola     Published Date: Feb 05, 2008
Read this overview of Good™ Mobile Messaging to learn how it can deliver all your enterprise e-mail, calendars, contacts and more—directly to your mobile workers—all in real time.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
    
Motorola

HBR Report: New Technologies Transforming the Finance Function

Published By: SAP     Published Date: Dec 04, 2015
Download this whitepaper to see how advanced technologies such as big data, cloud computing, mobile devices, and enterprise access to in-memory platforms, predictive analytics, and planning software can help CFOs make better and more sophisticated use of data, influence decisions, and take practical, timely action.
Tags : 
finance function, finance, cfo, big data, cloud computing, mobile, in-memory platforms, predictive analytics
    
SAP

HERE Navigation on Demand revitalize automotive navigation

Published By: HERE Technologies     Published Date: May 23, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEM’s brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges – such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
    
HERE Technologies

HERE Navigation on Demand revitalize automotive navigation

Published By: Here Technologies     Published Date: May 14, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEM’s brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges – such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
auto, mapping, location data
    
Here Technologies

How 4 Customers Solved the Enterprise Mobility Challenge

Published By: Citrix     Published Date: Jul 25, 2014
Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.
Tags : 
enterprise, mobility, challenge, data, windows, datacenter, web, solution
    
Citrix
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.