Skip to content
 

mobile application

Results 226 - 250 of 753Sort Results By: Published Date | Title | Company Name
Published By: CA Tech     Published Date: Jan 04, 2016
This white paper illustrates how Mobile application analytics can play a vital role in your DevOps strategy that can help your company create a superior end-user experience. Providing deep insight, this discipline produces benefits for a variety roles across the organisation.
Tags : 
customer experience, mobility, mobile application, mobile app, mobile application analytics, devops, application management
    
CA Tech
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to move beyond single task apps and enable the app workflows that help keep your mobile workforce productive and secure.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, business case
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Mobile apps are the key to productivity and are proving to be a competitive advantage for enterprises across every industry. “Are you App Able”, shows how companies today are capitalizing on secure mobile apps to drive LOB advantages and revenue.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile collaboration is fast, efficient, and necessary. But before you spend your time and money on a solution, you’d better learn what works—and what doesn’t. Read this guide to learn what to consider, mistakes to avoid, and tips for data security.
Tags : 
mobile collaboration, secure collaboration, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, employee collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You can’t slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. You’ll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Microsoft is making a massive push to the cloud, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in its complexity. Read this eGuide to learn about industry trends and best practices for rolling out Office 365 with maximum user adoption.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Aug 03, 2016
Microsoft is making a massive push to the cloud. As a result Office 365 is taking off. But in its complexity, Office 365 is unlike any other cloud app. Often this causes impactful deployment delays. Instead of relying on legacy tools Microsoft gives away, learn to remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. This webinar will discuss: • The basic identity management requirements for an Office 365 deployment • Microsoft’s existing identity management tools • The role of identity management in building a diverse cloud strategy
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Published By: Progress     Published Date: Mar 26, 2018
Digital transformation has changed the face of business across the globe. New digital technologies— specifically, mobile devices—are opening new avenues for companies to engage their prospects and manage their operations with greater effectiveness and efficiency. However, in the healthcare space, the response to these technological innovations has been reserved. While it’s undeniable that digital transformation could bring great change to the healthcare space just as it has in other industries, obstacles like regulatory compliance and rigid systems of record discourage the adoption of new tools and technology. This has led to frustration from all sides of the healthcare ecosystem. Many people are accustomed to using intuitive digital applications in their everyday lives, so when healthcare applications deliver archaic user experiences, everyone is left wanting more. Patients and members want applications that enable them to manage their health more easily. Providers want to provide new
Tags : 
    
Progress
Published By: LogMeIn     Published Date: Feb 27, 2018
The rise of mobile devices have changed the way we communicate, the way we work, and the way we shop. Mobile devices give power to the consumers. Constant connectivity allows for easy access to endless information providing customers with multiple purchase options. In eCommerce, mobile shopping is sharply rising. According to Forrester, 29% of all U.S. eCommerce transactions will occur on a tablet or mobile phone this year, totaling $114 billion. By 2018, that percentage will rise to 54% of the total $414 billion in eCommerce sales.i All of this information points to the fact that mobile is not just a trend, it's a reality. A reality that forces businesses to change the way they engage with their customers.
Tags : 
mobile, applications, reporting, deployment, chat, device
    
LogMeIn
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Workday     Published Date: Aug 20, 2018
HCM suites and their individual applications also provide reporting and data as needed by local and international regulations, and often include analytics and dashboard capabilities. Transactional employee and manager self-service have become embedded roles within these solutions, and the ability to support mobile access has also become a fundamental part of these offerings. With increasing frequency, we see the inclusion of tools and applications embedded within HCM technologies to infuse traditional processes with collaboration, and capitalize on approaches that leverage social channels in the workplace to enhance overall user engagement and productivity.
Tags : 
cloud, hcm, suites, midmarket, enterprises, analytics, employee
    
Workday
Published By: IBM     Published Date: Oct 02, 2015
Get the essentials about agile testing and service virtualization from several different perspectives
Tags : 
agile testing, service virtualization, return on investment, roi, mobile development, packaged applications
    
IBM
Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management, network intelligence, ip networks, network management
    
BlueCat
Published By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : 
sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy, analytics, content management systems, interactive marketing, web analytics, crm solutions/software, data management/analytics
    
SDL Web Content Management Solutions
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications
    
Okta
Published By: apperian     Published Date: Apr 13, 2012
The explosive growth and superior performance of the iPhone and iPad has changed the definition of mobile computing. As more employees ask to use their iPhones and iPads for business purposes, companies are facing increased demand to provide enterprise application management.
Tags : 
apperian, iphone, ipad, enterprise applications, technology, business technology
    
apperian
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.