business apps

Results 76 - 100 of 222Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: K2     Published Date: Apr 27, 2015
This paper describes how a business-app platform from K2® can help you provide simpler, more cost-effective ways to empower people by connecting them with data that is dispersed across different systems.
Tags : 
erp and legacy systems, data volume, business processes, cloud crm system, system complexity, business apps, enterprise applications, data center
    
K2
Published By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
    
K2
Published By: K2     Published Date: Oct 08, 2015
Read to learn more about how K2 blackpearl can help make the challenge of rebuilding your business applications more manageable.
Tags : 
    
K2
Published By: VMware AirWatch     Published Date: Feb 27, 2018
NOT ALL UEM SOLUTIONS ARE CREATED EQUALLY MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn how to enhance your existing AirWatch mobility solution with the critical requirements of UEM: • Establish a clear migration path to modern management • Fully support legacy Windows processes and apps • Reduce IT silos with cross-platform support, including Mac and Chrome • And more
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Feb 27, 2018
NOT ALL UEM SOLUTIONS ARE CREATED EQUALLY MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn how to enhance your existing AirWatch mobility solution with the critical requirements of UEM: • Establish a clear migration path to modern management • Fully support legacy Windows processes and apps • Reduce IT silos with cross-platform support, including Mac and Chrome • And more
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management
    
MuleSoft
Published By: Salesforce     Published Date: Aug 01, 2016
This e-book will help you learn how to build a great software as a service (SaaS) business. It will show you how partnering with Salesforce gives you an unparalleled advantage in the marketplace to build, market, sell, and grow faster.
Tags : 
salesforce, saas, software as a service, business growth, trusted business apps, software development, knowledge management, enterprise applications
    
Salesforce
Published By: FinancialForce     Published Date: Aug 20, 2019
Grow your business with a customer-centric ERP solution Align your sales, services, finance and HR teams with our cloud-based ERP on Salesforce. You’ll connect back-office functions to the front-office and create a single unified voice across your organization. Everyone benefits: Customers, Employees, Leaders and IT. One customer record for CRM and ERP apps Seamless opportunity to cash process Eliminates errors between the front and back office Act as one company, not five departments
Tags : 
    
FinancialForce
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
When applications are core to your business, the approach you take to developing apps a?ects your bottom line. Many organizations are using modern application development best practices to build better apps and microservices are a key component of those e?orts.
Tags : 
    
Amazon Web Services EMEA
Published By: K2     Published Date: Apr 01, 2016
This white paper reveals how K2 blackpearl can help make the challenge of rebuilding your business applications more manageable. Its visual, easy-to-use tools help ensure that you are not dependent on consultants or even your IT department to build apps.
Tags : 
ibm lotus, ibm lotus domino, microsoft sharepoint, it management
    
K2
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2
Published By: K2     Published Date: Apr 01, 2016
This paper describes how a business-app platform from K2® can help you provide simpler, more cost-effective ways to empower people by connecting them with data that is dispersed across different systems.
Tags : 
sap, business app, sap software, it management
    
K2
Published By: Sage People     Published Date: Apr 10, 2018
Why modern enterprise management is the new business reality. It’s easy—and often justifiable—to blame rapid, unceasing technological advancements as the cause of many of today’s major challenges in industries such as manufacturing, distribution, and services. Globalisation, a mobile workforce, and new apps and tools are among the many factors that have created a new reality in which:
Tags : 
    
Sage People
Published By: Dell & Microsoft     Published Date: Mar 13, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : 
dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet
    
Dell & Microsoft
Published By: MobileIron     Published Date: Feb 12, 2019
The adoption of mobile and cloud technologies is driving massive change in organizations around the world. These new technologies enable organizations to streamline business processes, lower costs, and help employees work productively anywhere. However, securing mobile apps and cloud services requires more than passwords and legacy security approaches that aren’t designed for the mobile-cloud world.
Tags : 
    
MobileIron
Published By: Apsalar     Published Date: Aug 04, 2015
Apps are a critical part of more and more commerce businesses. If you need to drive more ROI from your apps, download 35 Tips for Successfully Marketing mCommerce Apps.
Tags : 
mobile marketing, mobile apps, mobile app marketing, appstore tips
    
Apsalar
Published By: Cloud Sherpas     Published Date: Dec 01, 2015
In this complimentary report, Cloud Sherpas shares results that uncover the shortcomings of the primary, on premise computing devices typically in use today, including extended wait times for users and high maintenance requirements for IT that lead to significant productivity losses for both groups.
Tags : 
chromebook, google chrome, google enterprise solutions, google cloud applications, business cloud apps, google app migration, cloud apps for business, google apps resellers
    
Cloud Sherpas
Published By: VMware AirWatch     Published Date: Sep 21, 2016
Deliver better services, reduce expenses and comply with regulations are familiar business demands heard by financial services IT leaders. Simultaneously, the time and cost of managing custom apps to run core business operations continues to rise. Not only does this obstruct the speed of innovation adoption, it also increases the need for better end user experiences due to app management volume. How can financial services IT teams enable more efficacy alongside business growth, while reducing their own IT management burden? This ebook examines four ways financial services organizations can deliver apps and manage users at scale while reducing costs and optimizing existing investments.
Tags : 
    
VMware AirWatch
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee