mobile strategy

Results 151 - 175 of 336Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 07, 2015
By 2018, company-supplied mobile phones will exceed 228 million and mobile devices will replace 63% of desktops. Are you ready?
Tags : 
ibm, mobile, devices, strategy, infrastructure, wireless, business technology
    
IBM
Published By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2016
How to realize your mobility solution’s full potential.
Tags : 
ibm, mobile, infrastructure, strategy, mobility, wireless, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 01, 2016
Read the IDC analyst report to learn - Building blocks and best practices for successful deployment and adoption of your mobility initiative; - Critical factors to consider when evaluating a mobility service provider; - Details on how to realize your mobility solution’s full potential.
Tags : 
ibm, ibm connect, idc, mobile, mobility
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
    
IBM
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : 
maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile, emm, mobile management strategy, mobile device management, mdm, mobile device management solutions, application management, it management, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod, security, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Feb 09, 2015
The time to implement a mobile device management (MDM) strategy is now! But where should you begin? Download this guide to learn the 12 best practices of Mobile Device Management.
Tags : 
ibm, fiberlink, mobile device management, mdm, mobile, mobile security, byod, bring your own device, mobile application, content management, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
IT is set to be the great enabler of the lightweight application revolution, first though they need to learn how the new paradigm of multiple operating systems across all devices requires a new more open management mindset.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Volume II: Four Components of a Solid Mobile App Strategy! Successfully becoming mobile first and app enabled is a simple exercise of discovery, scalability, sustainability and security.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Volume III: Four Components of a Solid Mobile App Strategy! Successfully becoming mobile first and app enabled is a simple exercise of discovery, scalability, sustainability and security.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Tired of hearing all the ways you need to go “mobile” and all the ”things” it can do for your business. Don’t buy the hype, here’s a list of perfectly valid reasons fast and secure mobile deployment and management is a bunch of hullabaloo and poppycock.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Get the latest mobile devices and apps in the handsof learners and educators quickly and securely with mobile device and app management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, education
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, financial services
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, healthcare
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, manufacturing
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, retail
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee