Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mobile devices

Results 176 - 200 of 876Sort Results By: Published Date | Title | Company Name
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase, wireless
    
Sybase
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Oracle     Published Date: May 22, 2012
With the growing number of channels for consumers to connect with your products from store kiosks to mobile devices and social networks, it is increasingly important that they are experiencing the the same consistent brand experience regardless of the channels they choose. This whitepaper describes 3 customer experience features to help guide your decisions about technology, organizational structure, and internal process.
Tags : 
oracle, multichannel integration, marketing, customer experience
    
Oracle
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
    
Intralinks
Published By: Bronto     Published Date: Mar 30, 2012
With consumers practically attached to mobile devices and beginning to accept marketing messages on Facebook and Twitter, marketing efforts are less about driving to a specific channel and more about having a promotional presence in all of them and keeping the person engaged throughout the customer lifecycle. The reasons for disengaging from a purchase decision are nearly infinite, and the means to disengage are just a few taps away on a smartphone.
Tags : 
bronto, marketing, emerging marketing, digital marketing, online, digital, e-commerce
    
Bronto
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: Microsoft     Published Date: Oct 24, 2016
This report explores the four elements of an enterprise mobility strategy and how to address the challenges that your enterprise may face in a mobile environment.
Tags : 
enterprise mobility management, mobility, mobile devices, bring your own device, remote access
    
Microsoft
Published By: ClearSlide, Inc     Published Date: Jan 28, 2015
Both inside and outside sales professionals are becoming more mobile, with industry research showing that half are already using tablet devices and an additional 26 percent plan to adopt them in the next 18 months. By integrating mobility in the sales workforce, businesses are able to increase overall productivity, effectiveness as well as meeting sales goals since they are able to access information and content anytime, anywhere, through any mobile device. Yet, there are still major obstacles to overcome when trying to implement a strategy to bring mobility to your sales force.
Tags : 
sales mobility, increasing productivity, increasing revenue, sales performance optimization, sales performance, sales management
    
ClearSlide, Inc
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications
    
PulseSecure
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
Mobile is undoubtedly changing both our personal and professional lives. Customer service organizations should decide on a strategy to bridge the gap between mobile behavior and customer service. This requires a strategic review of value drivers, combined with a tactical search for relevant use cases. Don’t fall in the “we need an app for everything” trap — some users need big screens, some users don’t. Some need a rich experience, others just need basic functions. Your strategy must take all of these dynamics into consideration.
Tags : 
data search, mobile devices, customer service, organization optimization, employee expectations, opportunities, global oracle data centers, data center traffic, customer interaction
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data, wireless
    
CDW
Published By: 2ergo     Published Date: Apr 09, 2010
When Rightmove wanted to be the first to provide an innovative and engaging mobile app that would move millions of iPhone users to access extensive property search functionality, they turned to 2ergo. Learn about the challenges Rightmove faced, the solution 2ergo provided, and the unbelievable results that were achieved, including how the app ultimately ranked in the top 30 Apple "Best Apps of 2009" chart.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps, property app
    
2ergo
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: Adobe     Published Date: Sep 28, 2016
As the digital landscape evolves, marketing channels become more complex. That means that personalizing advertising campaigns across every channel is becoming even more crucial. Read Cross Channel Advertising with AMO to learn how managing advertising campaigns programmatically lets you deliver unique customer experiences while giving you the control and insight you need. Download our report to learn more about: • Search marketing standards across the US and UK in 2015 • The recent shift of consumer transactions on mobile devices • The next big trend in ad spend
Tags : 
adobe, cross channel, cross channel advertising, advertising, marketing, marketing channels, digital
    
Adobe
Published By: Oracle OMC     Published Date: Nov 30, 2017
Today’s consumers are demanding: they have become more unforgiving of a poor customer experience and expect interactions on their desktop and mobile devices to be responsive, intuitive, and easy to use. Marketers understand that delivering the most relevant experience is the key to gaining continued satisfaction and loyalty from their digital consumers. Oftentimes, however, when it comes to marketing to consumers there are two dynamics. On one hand you have what consumers say they want out of a customer experience. On the other hand, there is what they actually receive. What they want are experiences that are personalized, contextually relevant, and consistent— regardless of online or offline channel or lifecycle stage. What they too often get, however, are experiences that are disconnected, not contextually relevant, and inconsistent across channels and lifecycle stages.
Tags : 
    
Oracle OMC
Published By: Salesforce     Published Date: Dec 29, 2015
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers, enterprise applications, human resource technology
    
Salesforce
Published By: Salesforce     Published Date: Jan 14, 2016
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers, enterprise applications, human resource technology
    
Salesforce
Published By: Applause Israel     Published Date: Jun 19, 2018
APPLAUSE CASE STUDY ACCELLION THE INCREASING IMPORTANCE AND COMPLEXITY OF DIGITAL EXPERIENCES Maintaining a strong digital presence is critical as digital experiences are now the front door for your brand. Websites, mobile apps, and connected devices are all different ways for you to connect with your customers on a deeper level, and foster a stronger relationship of trust and loyalty. While you now have a wide-open avenue to reach customers more effectively, you also need to account for a whole new level of complexity, especially in the mobile space. Millions of people can download the same mobile app and have entirely unique experiences. This is a result of how fragmented the digital world has become. ScientiaMobile counted 45,000 different device profiles on the market today, and estimates that this rate of fragmentation will only increase heading into the future. On top of this variability is the wide range on contexts in which your customers can be relying on your mobile app to wo
Tags : 
    
Applause Israel
Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model
    
Adobe
Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology
    
Salesforce.com
Published By: VMware     Published Date: Feb 24, 2017
End users expect to be able to work anywhere, at any time, and from any device. Additionally, they expect a similar experience for accessing work apps and data across all their devices—desktop, laptop, tablet, and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices. A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. VMware AirWatch® Unified Endpoint Management™ provides IT with a comprehensive view of asset inventory and full lifecycle management of endpoints across the organization. Read more to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Tags : 
    
VMware
Published By: Equinix     Published Date: Jul 13, 2016
This case study illustrates how mobile's performance is improved by a 70% reduction in latency, from 12 ms to 5 ms using Equinix and AWS Direct Connect.
Tags : 
mobile, mobility, mobile performance, mobile devices, gaming, mobile apps
    
Equinix
Published By: Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.