RSS feed Get our RSS feed

News by Topic

mobile use

Results 151 - 175 of 828Sort Results By: Published Date | Title | Company Name
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Mobile is the new normal for users to connect and consume content, you need to consider apps, mobile integration,security, analytics, development tools, life-cycle management, various mobile stakeholders, and the overall enterprise mobile ecosystem.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: Cisco     Published Date: Oct 08, 2018
Today more than ever, business wins depend on teamwork. And the teams that make things happen are bigger, more diverse, and more distributed than ever. People are working at home, in coffee shops, and on the road. They span multiple time zones. They use every imaginable device, relying heavily on their mobile phones. They grapple with deadlines because their tools don’t connect. With so much to manage, people are challenged to be truly present and focused in the moment. To make the most of each opportunity and maintain business momentum, they need tools that allow them to work intuitively. Effortlessly. That fade into the background, leaving them free to keep focused, stay engaged, get inspired, innovate. That allow them to connect as if they were in person, when they’re not. To learn from industry experts on how collaboration works, Download Report!
Tags : collaboration, workspace transformation, workforce transformation, virtual meetings, digital transformation, webex, webex meeting, webex teams
     Cisco
By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : mobile, cloud, applications, apps, mobile apps
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: ClickExpress     Published Date: May 01, 2013
Even if you have only 15 mobile workforce employees, you can reduce costs and improve the customer’s experience using optimization software. Today, it’s easy because you don’t even have to provide dedicated mobile devices to your field employees, just an app. But how do you avoid difficult transitions for workers, long implementation times, and solutions that don’t work as you really needed? This paper walks you through the 6 steps to successful decision making.
Tags : 6 essential, mobile, workforce, management, software, customer, experience, optimization
     ClickExpress
By: ClickExpress     Published Date: May 01, 2013
Deploying a mobile workforce solution used to be a major undertaking. Today, it’s easy. You don’t need any specialized devices; management software is cloud-based, and training is short and simple. In other words, obstacles of the past have disappeared, and now is the time to implement mobile workforce solutions for organizations with between 15 and 250 mobile workforce. In this brief, you’ll see why it’s easier than ever to implement software solutions for mobile workforce.
Tags : mobile, workforce, solution, organizations, mobile, implement, software
     ClickExpress
By: MobileIron     Published Date: Sep 22, 2014
The explosive popularity of mobile devices and apps offers a tremendous opportunity for any enterprise to become a “Mobile First” organization — one that views mobility as the most important business enabling technology today. Mobile First organizations understand that the Bring Your Own Device (BYOD) trend is here to stay and is fueled by users who expect total flexibility in managing their professional and personal business wherever they are, on their device of choice. However, the ability to securely and cost-effectively enable BYOD presents a significant challenge for even the most forward-thinking companies.
Tags : mobile devices and apps, mobile first, total flexibility, enterprise, cost-effectively enable byod
     MobileIron
By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity
     MobileIron
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
     MobileIron
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
     MobileIron
By: CA Technologies     Published Date: Jun 04, 2015
DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this.
Tags : 
     CA Technologies
By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
     MobileIron
By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
     MobileIron
By: Aternity     Published Date: May 18, 2015
Seven capabilities are required to address the complexity of delivering excellent enterprise mobile experience. Download this whitepaper to learn how.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 18, 2015
Download this whitepaper to learn the five reasons why End User Experience Management is much more than a dimension of APM.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 19, 2015
Read this whitepaper to navigate through the End User Experience Monitoring (EUEM) landscape. Learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their workforce users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 22, 2015
Learn how Aternity redefines end user experience management in this series of brief videos.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: Oct 20, 2015
This exclusive guide (a $1295 value), featuring Gartner Research, provides an overview of the five key capabilities for improving enterprise mobile workforce productivity beyond traditional monitoring. It also give you access to Gartner’s Market Guide for Mobile Application Performance Monitoring and Industry use case examples on how Aternity Mobile APM has improved both customer and workforce end user experience. The guide also explains how, when it comes to actually measuring and improving the end user experience, Aternity Mobile APM uniquely addresses what counts most to the mobile workforce – the performance of the app as it renders on any device.
Tags : mobile workforce, end user experience, aternity, mobile apm, application performance
     Aternity
By: VMware AirWatch     Published Date: Jul 19, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
     VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics