Home | About | Publishers | Advertisers | Contact | Directory
Your Research Library for Finding Relevant BtoB Whitepapers, Webinars, eBooks, and Digital Content

Find Research


Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

mobile devices

Results 326 - 350 of 832Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jun 11, 2014
The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. It’s not just about being able to work anywhere and anytime, it’s about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : 
box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies, it management, knowledge management
    
Box
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
    
Box
Published By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
    
AppDynamics
Published By: Equinix     Published Date: Oct 20, 2015
Enterprises must prepare for the emerging digital user. Future interactions among people, whether enterprise employees, partners or customers, will be primarily digital and heavily influenced by mobile devices, social media, analytics and the cloud. User interactions with systems of record, such as databases and files, will largely give way to interactions with systems of engagement, such as social media.
Tags : 
enterprise, digital user, user interaction, systems of engagement, analytics and the cloud, mobile devices, social media, enterprise applications
    
Equinix
Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data, it management
    
Gigya
Published By: Citrix     Published Date: Nov 04, 2015
More and more, your customers are connecting to your products and services on their mobile devices. So if your goal is to provide great customer service, that’s where you need to be: in the app, interacting with customers. Join this webinar to hear industry experts discuss how in-app support will be the next era of customer service. Emerging mobile technologies are posing new challenges and opportunities — are you and your support team prepared? Attend this live webinar to learn: • Ways to evaluate your support center for the mobile world • How new technologies will impact the customer service industry • Why your customer service should offer in-app support options • And more…
Tags : 
    
Citrix
Published By: Panasonic     Published Date: Nov 09, 2015
This report will examine the enterprise mobility trends that are currently asking the question: “Does rugged mobile technology still have a role to play?” and provide businesses with an educated stance for their future rugged investments.
Tags : 
panasonic, data, mobile device, knowledge management, enterprise applications, platforms, data management
    
Panasonic
Published By: Flexera Software     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management, security, enterprise applications
    
Flexera Software
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Progressive companies of all sizes today are taking advantage of new, web-based technologies to reduce IT complexity and increase their competitiveness. Mobile apps and devices that provide anywhere, anytime connectivity and cloud infrastructure that enables seamless, scalable growth give them the speed and flexibility to grow quickly and expand into new markets. In this whitepaper you will find three examples of forward-thinking franchise owners and entrepreneurs that are growing their businesses and positioning themselves for the future with unified communications solutions. These franchises are: McDonald's RE/MAX Fix Auto Download now to learn more!
Tags : 
franchise, mcdonald's, mobile app, positioning, communication solutions, 8x8
    
8x8 Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Sie müssen stets für das kontinuierliche Wachstum Ihres Unternehmens sorgen. Im Zuge der anhaltenden Dynamik der Application Economy setzen Sie zur Förderung dieses Wachstums vermutlich auf digitale Unternehmensinitiativen. Folgende Ziele für diese Strategie versprechen das größte Potenzial: • Bereitstellung einer herausragenden digitalen Customer Experience über Mobile Devices • Erschließung von Märkten und Umsatzquellen über unterschiedliche Kanäle• Vernetzung von Mitarbeitern und Partnern mit Unternehmensdaten jederzeit und standortunabhängig • Einführung innovativer neuer Services für das Internet of Things (IoT)
Tags : 
    
CA Technologies EMEA
Published By: Adobe     Published Date: Apr 23, 2018
See your peers' biggest priorities, most important KPIs, and marketing spending for mobile devices and experiences. Between September and October 2017, Adobe surveyed close to 500 marketers and IT professionals to explore current mobile trends and priorities, get a glimpse of where they're going with their mobile efforts, and learn what the most advanced organizations are doing to create the next wave of transformative mobile experiences. Read our findings and see how mature your mobile strategies are in comparison to your peers'.
Tags : 
    
Adobe
Published By: Looker EMEA     Published Date: Sep 27, 2017
Want to know how Business Intelligence products vary in categories such as scalability, reliability, technical support, value for price paid, integrity, and whether the vendor is recommended? Read this report to get: • A side-by-side comparison of 28 BI tools • Ratings across 33 metrics for each vendor • Real customer feedback on performance
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Looker EMEA
Published By: Brocade     Published Date: Sep 07, 2010
The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher-education campuses fertile ground for wireless LAN technology.
Tags : 
brocade, wireless lan, open learning, wlan, intrusion protection system, ips, internet security, intrusion detection, intrusion prevention, wireless hardware, wireless infrastructure, wireless security
    
Brocade
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam, identity management, password management, security management
    
F5 Networks Inc
Published By: Riverbed     Published Date: Apr 24, 2015
Enterprise IT has gone through several waves of evolution since the birth of computing. The computing platform has evolved from mainframe computing to minicomputers, shifted to client/server computing, and finally moved to Internet computing in the cloud era. Read this white paper to learn more about the need for location-independent computing.
Tags : 
hybrid enterprise, location-independent computing, enterprise it, computing platform, cloud computing, mobile devices, networking, software development, it management, wireless
    
Riverbed
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy, customer relationship management, customer satisfaction, business intelligence
    
Cherwell Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research