Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

android

Results 101 - 125 of 125Sort Results By: Published Date | Title | Company Name
Published By: Sophos     Published Date: Jul 15, 2013
This MDM buyers guide will walk you through the process of selecting the right mobile device management solution that fits your company’s BYOD objectives. It explains how an effective MDM system can support an organization's workforce mobility strategy, ensure compliance, and provide central management of devices and apps while supporting easy administration.
Tags : 
sophos, byod, buyers guide, mobile device management, mobile device, android, windows 8, mobile, security, data protection
    
Sophos
Published By: Citrix     Published Date: Dec 09, 2013
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery, mobile security, ip telephony, network security
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : 
enterprise information, secure, android, apple ios, microsoft window tablets, flexibility
    
Citrix
Published By: Localytics     Published Date: Jul 18, 2014
In this 29-page eBook, written for people new to app marketing, you'll learn how to run app marketing campaigns that increase engagement, ROI and lifetime value.
Tags : 
app marketing, mobile marketing, app marketing guide, mobile marketing guide, market an app, push messaging, push marketing, in-app messaging, in-app marketing, user engagement, a/b test, ab test, app marketing best practices, android app marketing, ios app marketing, iphone app marketing, segment users, engage users, market app, message user
    
Localytics
Published By: Localytics     Published Date: Jul 18, 2014
In this 23-page eBook, written for people new to app analytics, you'll learn what you need to know to start improving your app.
Tags : 
app analytics, mobile analytics, app analytics tools, app analytics guide, app monetization, user value, user acquisition, user conversion, track users, app funnel, app tracking, app testing, app measurement, app performance, app optimization, android app analytics, ios app analytics, iphone app analytics, app stats, app data
    
Localytics
Published By: IBM     Published Date: Aug 21, 2013
Until now, marketers have been limited to two relatively uninspired options for sending direct communications to consumers on their mobile phones: SMS (a.k.a., text messaging), and text-only, imageless email on devices like the BlackBerry and Palm Treo. But with the introduction of Apple’s iPhone and competitor operating systems like Google’s Android and Palm’s Pre/Pixi now offering similarly rich user experiences, email marketers have a huge opportunity to reach consumers anywhere, any time, on their mobile devices.
Tags : 
email marketing, enterprise marketing management, email performance, mobile marketing, mobile reach, marketing channels
    
IBM
Published By: IBM     Published Date: Jan 26, 2015
IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.
Tags : 
analytics service, open cloud platform, ibm, web developers, mobile developers, business integration, security, it management, enterprise applications, data center
    
IBM
Published By: IBM     Published Date: Feb 02, 2015
Learn more about the benefits of Bluemix. This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application.
Tags : 
mobile data, android application, mobiledata service, business processes, business technology, software development, enterprise applications
    
IBM
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation
Published By: Avema Critical Wireless     Published Date: Jul 26, 2011
A starting point to learn about Mobile Device Management, and the need for mobile device security
Tags : 
mobile device management, smartphone security, tablet security, mobile security, mobile management, ios security, android security
    
Avema Critical Wireless
Published By: Symantec     Published Date: Oct 02, 2012
Android is on the rise. In a 2011 study, Distimo found that the Android Market (now known as Google Play) eclipsed the Apple App Store in terms of free apps, with 134,342 apps compared to Apple's 121,845.
Tags : 
android, applications, htc, apple, ios, samsung, secure, code, signing, certificates
    
Symantec
Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management, wireless
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Get the details on how BlackBerry Mobile Fusion can make managing mobile devices - including those running Apple iOS and Google Android operating systems faster, easier and safer than ever.
Tags : 
byod, bring your own device, blackberry, mobile device, managing mobility, managing enterprise mobility, smartphones, mobile device management
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, network security
    
IBM MaaS360
Published By: MobileIron     Published Date: Apr 13, 2015
Here are ten things IT administrators need to know about Android for work. Suggestions for maximizing effectiveness of a BYOD office environment.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
    
MobileIron
Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : 
cyber security, lookout, smartphone, tablet, mobile
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share.
Tags : 
enterprise, mobile, ios, android, lookout
    
Lookout
Published By: Q2 eBanking     Published Date: Sep 06, 2017
Get the details on Q2's adaptable mobile architecture. Financial institutions now can close the mobile expectation gap and stay ahead of competitive pressures. Provides native integration with iOS and Android.
Tags : 
    
Q2 eBanking
Published By: Infosys     Published Date: Jan 02, 2019
Challenge: An air purifier manufacturer needed to remind customers to periodically change filters to maintain product efficiency and deliver consistent customer experience. Solution: We helped them develop a Bluetooth enabled ‘smart’ air filter, where an embedded sensor measured the effectiveness of the filter and relayed that information to an iOS or Android app. Users were alerted when filters needed replacing, and given the opportunity to buy directly through online retailers and also to subscribe to the Amazon Device Replenishment Service. Outcomes: • Increased revenue through replacement filter sales • Expected to touch 50,000 users in the first year • Integrated with Amazon Alexa for seamless digital experience • Powerful product differentiation in a crowded market
Tags : 
    
Infosys
Start   Previous    1 2 3 4 5     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.