mobile strategy

Results 51 - 75 of 336Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: Skillsoft     Published Date: Dec 06, 2016
Millennials are the first true “digital natives,” and because of this, they are often associated with driving new work practices and expectations. However, it is actually the ubiquity of technology, the accelerated pace of work and our consumer experiences that are driving new work practices, not millennials. New research tells us that to be engaging, L&D teams need to focus on modern learning rather than millennials.The formula for modern learning is: • Learner-centric • Micro/modular • Varied treatments • Retention-driven • Embedded • Mobile Download “Millennial Learning Myths and Misconceptions Prescriptions for a Modern Learning Strategy” for tips for enabling modern learning at your organization.
Tags : 
learning, engagement, millennials, learning and development, knowledge management
    
Skillsoft
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
    
Veracode
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
Mobile is undoubtedly changing both our personal and professional lives. Customer service organizations should decide on a strategy to bridge the gap between mobile behavior and customer service. This requires a strategic review of value drivers, combined with a tactical search for relevant use cases. Don’t fall in the “we need an app for everything” trap — some users need big screens, some users don’t. Some need a rich experience, others just need basic functions. Your strategy must take all of these dynamics into consideration.
Tags : 
data search, mobile devices, customer service, organization optimization, employee expectations, opportunities, global oracle data centers, data center traffic, customer interaction
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
As you likely know, mobile testing is the art and science of building, running, and analyzing optimization tests for mobile customer experiences. What you may not know, like many marketers, is how to do mobile testing really well. It starts with a solid mobile marketing strategy and ends with an effective mobile experience. Download this guide for the best advice from analysts, engineers, and thought leaders on how to help mobile-minded businesses master the non-desktop landscape.
Tags : 
    
Oracle Marketing Cloud
Published By: Swrve     Published Date: Mar 07, 2016
This whitepaper highlights if your mobile app strategy is killing your business and how to calculate the ROI to fix it.
Tags : 
mobile app, roi, return of investment, mobile app strategy, mobility, roi calculation
    
Swrve
Published By: TIBCO     Published Date: Nov 11, 2013
The right integration platform can kick start and accelerate your mobile strategy – reducing the time and budget you need for creating a superior mobile experience.
Tags : 
tibco, mobile strategy, integration, technology, best practices, 7 principles, platform, business technology
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
Unable to access the data you need? Lack of real-time information? Technology preventing fast execution of changing business strategy? These are just some of the clues you are probably spending more on integration than necessary.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
The right integration platform lets you extract more value from your ERP system - including improved business performance, increased organizational awareness, and better coordination of processes.
Tags : 
erp, process coordination, tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
In an IT landscape dominated by big data, mobility, social networking and cloud computing, integration will not only grow in importance, its very nature will change. This paper will discusses the 21st Century IT landscape as it relates to the new integration, and argues that the need for a comprehensive integration strategy has never been more urgent.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
How can you be sure integration is implemented properly so performance is not jeopardized? Don’t fail by using the wrong platform.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
Think Integration won’t have much of an effect on your business? That integration requires a team of expensive experts? Think again. The right integration platform will help reduce your budget while keeping you one step ahead.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
When a business event occurs, or a priority request for intelligence comes down the pipe, the modern enterprise has to be able to quickly deliver the right information to the right people. Unfortunately, many organizations continually struggle with accomplishing this task, as the size and complexity of their IT infrastructure rapidly expands. In this latest research, Aberdeen recommends actions for organizations currently involved in data integration, or contemplating the adoption of such practices.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO
Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology, knowledge management, data management, business technology
    
Salesforce.com
Published By: VMware AirWatch     Published Date: Feb 21, 2017
This paper provides guidance for selecting and purchasing a digital workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Download this whitepaper to access recommendations for the most critical specifications to help you in defining an effective digital workspace strategy for your environment.
Tags : 
    
VMware AirWatch
Published By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : 
enterprise mobile security, mobile security risk, risk reduction, device security
    
Lookout
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: IBM     Published Date: Jan 27, 2016
How to realize your mobility solution’s full potential.
Tags : 
ibm, mobile, infrastructure, strategy, mobility, wireless, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 01, 2016
Read the IDC analyst report to learn - Building blocks and best practices for successful deployment and adoption of your mobility initiative; - Critical factors to consider when evaluating a mobility service provider; - Details on how to realize your mobility solution’s full potential.
Tags : 
ibm, ibm connect, idc, mobile, mobility
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media, consumer mobile devices, mobile advertising
    
Forrester
Published By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : 
mobile, threat, defense, security, mobileiron, cyber, criminal
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee