RSS feed Get our RSS feed

News by Topic

mobile app strategy

Results 1 - 25 of 57Sort Results By: Published Date | Title | Company Name
By: ClearCompany     Published Date: Mar 24, 2016
As professionals in a world that is now driven by self-improvement, we’ve become very skilled at setting goals. There is a plethora of mobile apps that exist solely to help us track goals and keep ourselves accountable. Goals are what keep us engaged, looking ahead and striving to be better. That’s the same reason organizations spend hours, weeks, months and years planning and trying to execute them. But what good is all that motivation, strategy and planning if organizations can’t execute those goals properly? Well, none really.
Tags : clearcompany, human resources, hiring, recruiting, quality of hire
     ClearCompany
By: Samsung     Published Date: Dec 18, 2015
This paper will examine seven steps for developing a current, secure, and well-managed mobile app portfolio.
Tags : 
     Samsung
By: MicroStrategy     Published Date: Sep 09, 2014
Improve revenue, loyalty, and productivity while controlling costs. It’s a given: Most shoppers are now armed with a mobile device when they enter a retail store. They are highly informed and expect retail employees they interact with to be at least, if not more knowledgeable about a store’s products, promotions, and services. This white paper outlines the 5 key benefits of a winning mobile app strategy, including new ways retailers can effectively leverage mobile technology as a competitive advantage. With the average shopper looking at their phone more than 150 times a day, learn how leading retailers leverage mobile technology to: Enhance customer experience Drive sales Boost customer loyalty Achieve operational efficiencies Download this white paper to find out how retailers with a powerful, effective mobile app program in place can win the battle for shoppers’ eyes and ears — and wallets.
Tags : mobile apps, customer experience, customer loyalty, operational efficiencies, mobile technology, sales lift, customer loyalty, best practices
     MicroStrategy
By: OutSystems     Published Date: Mar 18, 2015
In this white paper we describe the top four issues that cause mobile projects to fail and outline a path that can take you safely around these common pitfalls and put you on track to delivering a powerful, flexible mobile application strategy.
Tags : application development, mobile app development, mobile app pitfalls, a guide to mobile app success
     OutSystems
By: MicroStrategy     Published Date: Aug 24, 2012
Guess GMobile app, developed using the MicroStrategy Mobile App Platform, instantly delivers up-to-the-minute operational information to their employees via the iPad.
Tags : microstrategy, guess, gmobile app, platform
     MicroStrategy
By: Adobe     Published Date: Feb 20, 2014
Adobe collaborated with Forbes Insights on this study in order to shed light on new mobile engagement opportunities: How are companies using apps, whether they are aimed at customers, employees or partners? What are the lessons learned so far? And what are best practices for using mobile and tablet apps?
Tags : forbes, adobe, mobile marketing, mobile applications, apps. mobile apps, digital marketing, customer engagement, marketing strategy
     Adobe
By: VMware     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
     VMware
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
     MobileIron
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
     MobileIron
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security
     Veracode
By: Swrve     Published Date: Mar 07, 2016
This whitepaper highlights if your mobile app strategy is killing your business and how to calculate the ROI to fix it.
Tags : mobile app, roi, return of investment, mobile app strategy, mobility, roi calculation, crm solutions/software, customer experience/engagement
     Swrve
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Tech     Published Date: Jan 04, 2016
This white paper illustrates how Mobile application analytics can play a vital role in your DevOps strategy that can help your company create a superior end-user experience. Providing deep insight, this discipline produces benefits for a variety roles across the organisation.
Tags : customer experience, mobility, mobile application, mobile app, mobile application analytics, devops, application management
     CA Tech
By: Good Technology Corporation     Published Date: Apr 29, 2013
Companies today can’t just “bolt on” mobile capabilities. To succeed, you have to put mobile first. Read—Moving Beyond BYOD to Mobile First: A 3-Step Approach for CIOs—to learn how a making mobile a core part of your IT strategy increases revenue.
Tags : mobile collaboration, byod management, byod solutions, byod strategy, enterprise collaboration, enterprise mobility, mobile device management
     Good Technology Corporation
By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
     Good Technology Corporation
By: Enterprise Mobile     Published Date: Oct 09, 2013
Enterprise app decisions may be some of the most important decisions you make. This brief will help guide your organization by providing valuable insight on delivering, supporting and securing mobile apps.
Tags : mobility-as-a service, managed mobility services, mobile application management, mam, apps, enterprise mobile, mobility, enterprise mobility
     Enterprise Mobile
By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : box, mobile first, securing information, mobile device management solutions, applications, enable management
     Box
By: CA Technologies     Published Date: Mar 12, 2015
Learn how to develop secure mobile apps with a UX that delights customers and see how your organization can benefit from a winning API strategy.
Tags : api, mobile apps, mobile app, security
     CA Technologies
By: MicroStrategy     Published Date: Mar 15, 2011
This free, one-day course covers an introduction to Mobile BI Applications and Mobile App architecture, interactivity and design techniques, and how to develop and deploy a fully-functional Mobile App. Students will spend the afternoon session exploring MicroStrategy software with hands-on, instructor-driven exercises.
Tags : microstrategy mobile class, bi application, business intelligence, mobile app architecture
     MicroStrategy
By: CDW     Published Date: Oct 10, 2013
Five key items can help reap solid ROI from launching a mobile application strategy. Organizations are demonstrating their interest in mobile apps with their checkbooks.
Tags : increase revenue, mobile apps, apps, mobility, mobile device, trademonster, productivity with apps, customer relationships management
     CDW
By: VMware AirWatch®     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
     VMware AirWatch®
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics