Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mobile now

Results 1 - 25 of 289Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Movable Ink     Published Date: Apr 01, 2016
Do your emails look great on mobile devices? In the UK, 70% of email opens occur on smartphones and tablets. You know you should be building responsive emails, but where do you start? Download ‘10 Quick Design Hacks for Responsive Emails’ to discover simple ways to create great-looking emails for mobile devices and see real life examples of how brands are making a big impact on a small screen.
Tags : 
email marketing, contextual marketing, mobile marketing, responsive email marketing, email design
    
Movable Ink
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access technologies were created twenty-years ago, before businesses were distributed, mobile, and users of cloud. View this slideshare to learn 3 reasons why now is the time for a new remote access model.
Tags : 
    
Akamai Technologies
Published By: InReality     Published Date: Aug 10, 2015
Consumers are No Longer Predictable, and their Path to Purchase is No Longer Linear… A decade ago, you had a fairly straightforward understanding of how your customers moved through their path to purchase. It was linear. Predictable. And consistent. But, the rapid increase of mobile and ecommerce channels has diffused the consumer’s journey into a labyrinth of shopping options. And, these consumers are now learning more, engaging faster and expecting greater value, convenience, and hyper-relevant offers catered specifically to their needs. How you respond to this change will either accelerate or isolate your brand from the market.
Tags : 
inreality, consumer insight, mobile channels, ecommerce channels, retail solutions, retail marketing
    
InReality
Published By: Smarsh     Published Date: Mar 13, 2017
According to the Pew Research Center, 97% of Americans who own a smartphone use them to send or receive text messages*, demonstrating that mobile messaging is one of the most widely used features. Download now to learn how texting exposes your company to massive risk.
Tags : 
    
Smarsh
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies
Published By: Inkling     Published Date: Nov 13, 2014
With your workforce relying on mobile devices, make sure you know these four emerging trends for better mLearning programs
Tags : 
learning management system, training content, interactive training, interactive content, employee training, sales training, employee onboarding, content creation
    
Inkling
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile, it management, data center
    
OutSystems
Published By: Zebra Technologies     Published Date: Sep 05, 2018
The retail shopper is changing rapidly. To keep up, so must the retail industry. The internet, online shopping, mobile communications, smartphones, tablets and more turning traditional shoppers into something else entirely: connected shoppers. Today’s shoppers can now shop online, on either a computer or mobile device, as well as in brick-and-mortar stores. For retailers, the implications are huge. In this complex new environment, there are two vital questions. First, as a retailer, how do you create differentiated value that will enable you to stand out from the crowd? Second, how can you strengthen customer relationships, build loyalty, increase sales and maximize profitability?
Tags : 
    
Zebra Technologies
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication
    
Entrust Datacard
Published By: Oracle     Published Date: Oct 02, 2013
Once a popular topic in IT circles, cloud computing is now part of the business vernacular. It’s mentioned in the C-suite, it’s mentioned around the water cooler where employees discuss their latest mobile devices and it’s now a part of consumer advertising campaigns.
Tags : 
oracle, marketing, saas, lob
    
Oracle
Published By: CCMI     Published Date: Jul 20, 2011
Telecom expense management is a critical and well-established discipline that has grown to encompass the challenging problem of mobile device and cost management. And now there's a simple, self-service approach to successful mobile expense management (MEM) that is simple to implement and demonstrates immediate results.
Tags : 
xigo, ccmi, mem, mobile expense management, voice report, telecom expense management, tem, mobile device management
    
CCMI
Published By: MicroStrategy     Published Date: Sep 09, 2014
Improve revenue, loyalty, and productivity while controlling costs. It’s a given: Most shoppers are now armed with a mobile device when they enter a retail store. They are highly informed and expect retail employees they interact with to be at least, if not more knowledgeable about a store’s products, promotions, and services. This white paper outlines the 5 key benefits of a winning mobile app strategy, including new ways retailers can effectively leverage mobile technology as a competitive advantage. With the average shopper looking at their phone more than 150 times a day, learn how leading retailers leverage mobile technology to: Enhance customer experience Drive sales Boost customer loyalty Achieve operational efficiencies Download this white paper to find out how retailers with a powerful, effective mobile app program in place can win the battle for shoppers’ eyes and ears — and wallets.
Tags : 
mobile apps, customer experience, customer loyalty, operational efficiencies, mobile technology, sales lift, customer loyalty, best practices
    
MicroStrategy
Published By: Oracle     Published Date: May 22, 2012
Being successful in the mobile channel hinges on the right technology. This whitepaper outlines how to approach your mobile strategy, drive cross-channel activity, and maximize your budget with the right technology foundation to achieve your mobile goals now, and in the future.
Tags : 
oracle, marketing, marketing strategy, mobile, mobile marketing, emering marketing
    
Oracle
Published By: Crownpeak     Published Date: Jul 29, 2015
This guide is intended to help you navigate the path to a mobile-friendly website that positions your company to succeed now and in the future. As we go into detail on the exponential growth of mobile and it's disruptive impact on businesses that have not yet adapted, we will discuss the 6 steps you need to take to prepare for this change in mobile adoption.
Tags : 
crownpeak, ebook, mobile friendly websites, mobile responsive design, conversion-optimized website design, wcm, web content management, personalization
    
Crownpeak
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The challenge is how to “go digital” in the right ways. For many companies, it will be an incremental journey. The HR world is changing quickly—global candidates are tech-savvy and are relying on mobile-enabled interactions. Now more than ever, HR teams are looking to improve the onboarding experience, increase employee satisfaction, and focus HR staff away from mundane tasks. This best practices paper outlines seven important ways that HR teams can make meaningful progress in their digital transformations." .
Tags : 
professionals, team, digital, transformations, technology, optimization
    
DocuSign UK
Published By: VMware AirWatch     Published Date: Jul 19, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware
Published By: Bridgeline Digital     Published Date: Apr 08, 2013
In this white paper, learn the 7 reasons to consider responsive design for your company's next generation website. With the mobile revolution already present, it is important to know the reasons why you must reconsider the design of your website. Branding, accessibility and cost are big reasons to consider responsive design for your companies website.
Tags : 
company, next generation website, accesibility, branding, cost, bridgeline
    
Bridgeline Digital
Published By: Bazaarvoice     Published Date: Apr 30, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : 
bazaarvoice, mobile consumer, mobile purchases, digital sales, mobile shppers, online reviews, retailers
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers
    
Bazaarvoice
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.