mobile apps

Results 76 - 100 of 473Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Mar 02, 2018
Enable Business Transformation with MobileIron EMM
Tags : 
    
MobileIron
Published By: Cisco and NVIDIA Corporation     Published Date: Feb 26, 2018
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps are disrupting tried-and-true business models, as well as entire industries. These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day. Read this eBook to learn more about powerful forces of digital business transformation!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
    
Oracle
Published By: Oracle     Published Date: Feb 21, 2018
As Mobile is the new normal for users to connect and consume content, you need to consider apps, mobile integration,security, analytics, development tools, life-cycle management, various mobile stakeholders, and the overall enterprise mobile ecosystem.
Tags : 
    
Oracle
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: Oracle OMC     Published Date: Nov 30, 2017
There’s really no mystery about mobile testing. It’s the art and science of building, running, and analyzing optimization tests for mobile customer experiences. But for companies looking to mobilize their websites and apps, the mystery often lies in how to do mobile testing really well. This guide assembles the best advice from analysts, engineers, and thought leaders to help mobile-minded businesses master the non-desktop landscape. You’ll learn how to optimize customer mobile experiences from strategy to execution. Along the way, you’ll get answers to common questions about mobile testing, find out about optimization testing in general, learn key differences between customer experience optimization (CXO) on mobile and desktop, and see how you can use design expertise to create bold and effective mobile experiences. So start reading and boost your understanding of mobile testing and optimization.
Tags : 
    
Oracle OMC
Published By: Oath     Published Date: Nov 29, 2017
Target, reach and engage your audience to drive measurable action and conversions with Yahoo Gemini native advertising solutions. Get more customers Native ads deliver up to 3.6X lift in searches for your brand name and services. Yahoo native ads e?ectively enhance your search campaigns. Drive better results Achieve results with targeted reach and up to 4x the performance of traditional banners. Engage a mobile audience 650M of our 1B global users are on mobile. Consumers spend nearly 3 hrs. on their mobile devices each day. Cost e?ective ads Native ads deliver up to 3.6X lift in searches for your brand name and services. Yahoo Gemini native ads on Oath owned and operated sites and apps can be purchased on a CPC or CPM basis. Native ads will be served to your customers based on their geo, demo and interest targets.
Tags : 
    
Oath
Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
Published By: Insight     Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
Tags : 
digital workforce, mobile worker, insight's connected workforce, intune, modern devices, end-user experiences
    
Insight
Published By: Insight     Published Date: Nov 16, 2017
Learn how to evolve your workplace technology and keep teams connected
Tags : 
connected workforce, modern workforce, mobile workforce technology, cloud for business, enterprise apps
    
Insight
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build?
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build
Tags : 
    
Oracle
Published By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today’s IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)—the ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: • Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. • Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. • Deploy locally with zero touch via automated
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Riverbed DE
Published By: MobileIron     Published Date: Sep 26, 2017
Today’s modern enterprise requires a comprehensive, unified platform like MobileIron Access, which is designed from the ground up to secure mobile apps, devices, and cloud services. MobileIron makes it easy to transform business by securing critical enterprise resources including desktop PCs, mobile devices, modern apps, and cloud services — all from a single point of control.
Tags : 
mobileiron, mobile, cloud, security, enterprise security
    
MobileIron
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s workforce is more mobile than ever before, routinely working whenever and wherever necessary, using a variety of mobile devices and productivity apps. They expect their tools to deliver the capabilities they need to stay productive and efficient. But what if they don’t? When a business doesn’t support its workforce with suitable, properly vetted apps, employees will often download and install the tools they like. This trend, called “Shadow IT,” is almost always a recipe for trouble. One-off, standalone apps don’t conform to business strategy and growth plans, but instead create difficulties — security, compatibility, compliance and technical support — that draw resources away from strategic work.
Tags : 
    
Microsoft Office 365
Published By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : 
mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
    
AppDynamics
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt. Apps bieten Unternehmen deutliche Vorteile hinsichtlich der Maximierung der Konnektivität, Verfügbarkeit, Flexibilität und Produktivität von Mitarbeitern.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
The existence of smartphones and tablets able to run lightweight apps has created a quantum leap in the potential of mobile devices in the workplace. Apps present enterprises with clear benefits in terms of maximizing employee connectivity, availability, flexibility and productivity.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.