RSS feed Get our RSS feed

News by Topic

mobile landscape

Results 1 - 25 of 65Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
     Adobe
By: Adobe     Published Date: Mar 17, 2016
Modern selling requires a deeper skill set than ever before. Facing hyper-educated buyers and stiff competition, sales reps and channel partners alike are still expected to do more, with less, and faster, as annual quotas continue to rise in a mobile, social, uber-connected business landscape.
Tags : adobe, sales friction, sales efficiency, kiss rule, customer experience/engagement, sales
     Adobe
By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : akamai, akamai gaming, infrastructure, distribution channel, technological advancements
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : mobile, mobile adoption, customer loyalty, always on
     Akamai Technologies
By: Avaya     Published Date: Jun 01, 2015
How well connected are you? That’s the challenge in today’s mobile, virtual business landscape as companies strive for consistent communications between employees, business partners, and clients. Too often, a remote working world can feel splintered, disconnected, and complicated, resulting in lower productivity—and lost opportunity.
Tags : avaya, cloud computing, mobile, unified communications, integration, application management
     Avaya
By: Bazaarvoice     Published Date: Nov 05, 2014
To compete in the new environment of always connected, highly informed consumers, retailers need to leverage five trends to realize higher conversions and larger transaction sizes. Find out how you can apply these 5 trends to your business.
Tags : bazaarvoice, retail trends, consumer trends, ecommerce, retailers, reail tips, integration, social
     Bazaarvoice
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
     BlackBerry Cylance
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, web threats, physical appliance, virtual appliance, saas, security, technology
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile, malware, security, scams, bluecoat, data loss
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, appliance, virtual, physical, saas, hybrid
     Blue Coat Systems
By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
     CA Technologies
By: Campaigner     Published Date: Apr 30, 2015
The purpose of this report is to educate marketers about the challenges presented by the mobile landscape and to present some practical and effective solutions for increasing mobile engagement and email marketing ROI.
Tags : mobile marketing, email marketing, mobile design, roi, smartphones, mobile engagement, mobile-friendly email campaigns, content management systems
     Campaigner
By: Cisco     Published Date: Jan 05, 2015
The introduction of personal and mobile endpoints is dramatically reshaping the landscape for group video collaboration. IT leaders should align their video portfolios for maximum utilization and strategic fit with their related investments in collaboration and unified communications.
Tags : mobile, video collaboration, portfolios, investments, unified communications
     Cisco
By: Cisco Systems     Published Date: Oct 01, 2013
What are consumer expectations for service providers (SPs) today? Cisco® Internet Business Solutions Group (IBSG) surveyed 14 SP executives to understand the new mobile landscape. See how your Wi-Fi strategy aligns with the findings. Read report.
Tags : wi-fi, cisco internet business solutions, mobile, best practices, trends, business strategies, telecommunication
     Cisco Systems
By: CMO.com     Published Date: Mar 16, 2017
New analysis by the Adobe Digital Insights (ADI) team reveals some noteworthy shifts in the mobile landscape. The first: Tablets have failed to make a real comeback, despite strong holiday discounting in the United States. Additionally, Google Accelerated Mobile Pages (AMP) is catching on in the United States, where internet saturation is turning the mobile space into a fearsome battleground.
Tags : amp, adobe digital insights, adi, mobile, tablet, amp
     CMO.com
By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : cyveillance, mobile security, cyberattacks, threats, malicious attacks, security
     Cyveillance
By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief and learn how to address management challenges while reaping the rewards that mobility has to offer.
Tags : enterprise mobile, mobility management, management strategy, risk management, mobility, enterprise applications, application risk management, enterprise mobility management
     Enterprise Mobile
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
     ForeScout
By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
     Group M_IBM Q119
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in today’s IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
     HPE Intel
By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
     IBM
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics