Home | About | Publishers | Advertisers | Contact | Directory
Your Research Library for Finding Relevant BtoB Whitepapers, Webinars, eBooks, and Digital Content

Find Research


Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

mobile app

Results 1 - 25 of 1321Sort Results By: Published Date | Title | Company Name
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Citrix and Google Chrome Enterprise     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Citrix and Google Chrome Enterprise
Published By: DocuSign UK     Published Date: Aug 08, 2018
"Global enterprises continue to look to their Procurement organisations to drive cost savings, improve service and speed up execution. As a Procurement professional, you know that moving away from paper-based processes is critical to maximising efficiency and workflow. To achieve this, you’re probably trying to shed the hallmark and last bastion of the traditional paper-based Procurement process: the ink signature. In this eBook, you'll learn how DocuSign is making it easy for Procurement teams to go mobile, manage business relationships, and execute approval cycles faster."
Tags : 
    
DocuSign UK
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data protection, data quality
    
Virtela Communications, Inc.
Published By: Epson     Published Date: May 10, 2018
This paper aims to: • Summarize recent developments in the current state of mobile transaction technology, with an emphasis on line busting as a part of mPOS systems • Highlight studies that point to mobile transaction’s projected significant short-term growth • Outline the business benefits of both mobile transactions and line busting • Provide in-depth guidance on how to evaluate mPOS systems for line-busting applications
Tags : 
    
Epson
Published By: Epson     Published Date: May 14, 2018
Over the past few years, improvements in mobile devices, Wi-Fi, and cloud computing have made mobile point of sale (POS) solutions e ective and a ordable for businesses of all sizes. Tablets have emerged as the most popular platform for mobile POS solutions, and you may have already heard the buzz about them. There’s a reason for all the hullaballoo. In addition to integrating payments and making retail transactions more e cient than using a traditional electronic cash register (ECR), tablet POS solutions can provide robust management data. A tablet POS solution makes sense for many retailers, particularly if you’re looking to: • replace an ECR or want to have a mobile POS in place on opening day • unlock new pro t-making and cost-saving opportunities • expand your business • keep pace with ever-changing customer expectations Figuring out which tablet POS solution is the best for your business may seem like a huge challenge. But don’t worry. Taking the right approach, by using too
Tags : 
    
Epson
Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing, software compliance
    
Harry lei
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Akamai Technologies     Published Date: May 24, 2017
Nutzer von Mobilgeräten sind heutzutage verwöhnt. Sie erwarten, dass ihnen ansprechende Inhalte blitzschnell und optimiert auf ihrem Mobilgerät bereitgestellt werden – und das noch in der gleichen Qualität wie auf dem Desktop-PC. Einerseits stellen diese permanent mit dem Internet verbundenen Nutzer eine hervorragende Geschäftschance dar. Andererseits müssen Unternehmen komplexe Herausforderungen meistern, um solch hohen Nutzererwartungen bei der mobilen Bereitstellung gerecht zu werden. In diesem E-Book werden wir drei dieser Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, Apps und mobile Websites meistern. So lassen sich Umsätze sowie die Kundeninteraktion und Kundenbindung steigern. Laden Sie das E-Book heute noch herunter, um zu erfahren, wie Ihr Unternehmen die heutigen Anforderungen im Mobilbereich erfüllen kann.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Apps sind auf dem Vormarsch: Bei der Nutzung mobiler Geräte entfallen 85 % der Zeit auf Apps. Der App-Markt ist jedoch extrem umkämpft und 20 % der heruntergeladenen Apps werden nur ein einziges Mal geöffnet. Wie können Sie Ihre App von der massenhaften Konkurrenz abheben? Der Schlüssel zum Erfolg ist die Performance. Laden Sie diese Infografik herunter. Darin erfahren Sie, worauf es ankommt, um sich in den komplexen App-Umgebungen behaupten zu können, und wie Sie Nutzer mit schnellen, interaktiven Apps überzeugen.
Tags : 
    
Akamai Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA
Published By: Zendesk     Published Date: May 31, 2018
Be always on with your customers; wherever they are. With Zendesk Chat, your customer agents can engage with customers over websites, mobile apps, and popular messaging apps like Facebook Messenger, Twitter, and LINE. That means you can build relationships with customers in the places they prefer.
Tags : 
    
Zendesk
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Enterprises are looking to innovations like big data, cloud-based services and mobile apps to improve decision making and accelerate business results. But legacy IT implementations—independent compute, storage and networking platforms, veneered with a hypervisor— often can’t deliver on the increased agility, scalability and price performance demands of this new era of IT.
Tags : 
information technology, networking platforms, return on investment, cloud-based services, mobile apps
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : 
mobile applications, ebusiness, web design, web traffic, mobile websites
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Today’s mobile users are spoiled. They demand rich, desktop quality experiences tailored to their devices and delivered at lightning fast speeds. And while these “always on” users represent a tremendous business opportunity, satisfying their high expectations requires overcoming complex mobile delivery challenges. In this e-book, we review three key mobile delivery challenges and explain how you can overcome them by optimizing for fast APIs, mobile apps, and mobile sites to increase engagement, revenue, and customer loyalty. Download today to learn how your business can Meet Today’s Mobile Mandate.
Tags : 
mobile adoption, customer loyalty, customer engagement, increase revenue
    
Akamai Technologies
Published By: ClearCompany     Published Date: Mar 24, 2016
As professionals in a world that is now driven by self-improvement, we’ve become very skilled at setting goals. There is a plethora of mobile apps that exist solely to help us track goals and keep ourselves accountable. Goals are what keep us engaged, looking ahead and striving to be better. That’s the same reason organizations spend hours, weeks, months and years planning and trying to execute them. But what good is all that motivation, strategy and planning if organizations can’t execute those goals properly? Well, none really.
Tags : 
clearcompany, human resources, hiring, recruiting, quality of hire
    
ClearCompany
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research