enterprise mobile

Results 251 - 275 of 646Sort Results By: Published Date | Title | Company Name
Published By: apperian     Published Date: Apr 13, 2012
The BYOD demand was initially created by the popularity of the iPhone and the iPad from Apple. Relying on the closed iOS operating environment, these devices presented a fairly straightforward challenge for businesses that wanted to allow access to corporate apps without compromising the security of company data. Read to find out more.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, business technology
    
apperian
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
: Interested in knowing what CIOs and other IT executives really think about the future of enterprise mobility? Enterprise Mobile uncovers the results of a survey conducted to assess the business impact of enterprise mobility based on input from technology leaders. The webinar provides tips to prepare for the future of enterprise mobility, secrets to removing barriers to mobile strategy implementation, and shares trends around how other companies are embracing mobile security.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Oct 08, 2013
Find out what enterprise companies and their technology leaders think about the future of mobility by exploring the results of a recent survey. You’ll learn about the strategies organizations are using to implement mobility, obstacles they’re encountering along the way, and the drivers behind the push to go mobile. With 2014 just ahead, this document gives helpful suggestions for future planning.
Tags : 
mobility-as-a service, managed mobility services, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Oct 09, 2013
Enterprise app decisions may be some of the most important decisions you make. This brief will help guide your organization by providing valuable insight on delivering, supporting and securing mobile apps.
Tags : 
mobility-as-a service, managed mobility services, mobile application management, mam, apps, enterprise mobile, mobility, enterprise mobility
    
Enterprise Mobile
Published By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps customers extend their SharePoint environments, quickly and easily meeting employees' needs for mobile productivity and secure external sharing with customers and partners. This whitepaper describes the top five ways that businesses are adding mobility and collaboration to SharePoint with Box.
Tags : 
box, sharepoint, mobility, collaboration, enterprise content, mobile productivity, mobile support, content management
    
Box
Published By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps businesses integrate these applications and in particular add secure mobile collaboration to Microsoft Office 365. This whitepaper best practices for integrating two common enterprise applications – content creation and collaboration – with Box and Office 365. It provides a guide for business making the transition to the cloud and key use cases for collaboration.
Tags : 
box, enterprise transformation, enterprise content collaboration, office 365, microsoft, api integration, content creation, content collaboration
    
Box
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
    
Box
Published By: Box     Published Date: Jun 19, 2014
This AIIM Trendscape report has in-depth interviews of 50 senior end users and industry leaders, highlights expert recommendations to maximize mobile opportunities within the enterprise and offers a 7-point mobile action plan that organizations can execute in the next 12 months. Obtain access to data, expert opinions and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing issues that are not readily apparent in existing coverage about mobile technologies.
Tags : 
box, aiim, mobile opportunities, mobile first, mobile technologies, applications, it management, enterprise applications
    
Box
Published By: Equinix     Published Date: Oct 20, 2015
Enterprises must prepare for the emerging digital user. Future interactions among people, whether enterprise employees, partners or customers, will be primarily digital and heavily influenced by mobile devices, social media, analytics and the cloud. User interactions with systems of record, such as databases and files, will largely give way to interactions with systems of engagement, such as social media.
Tags : 
enterprise, digital user, user interaction, systems of engagement, analytics and the cloud, mobile devices, social media, enterprise applications
    
Equinix
Published By: Panasonic     Published Date: Nov 09, 2015
In this report, we examine five business sectors which were early to adopt mobility, and look into the varying challenges and success stories they’ve experienced with mobile technologies.
Tags : 
panasonic, data, enterprise, mobile, it management, knowledge management, business technology, data center
    
Panasonic
Published By: Panasonic     Published Date: Nov 09, 2015
This report will examine the enterprise mobility trends that are currently asking the question: “Does rugged mobile technology still have a role to play?” and provide businesses with an educated stance for their future rugged investments.
Tags : 
panasonic, data, mobile device, knowledge management, enterprise applications, platforms, data management
    
Panasonic
Published By: Factiva     Published Date: Nov 13, 2015
No longer is it enough for knowledge centers to have highly-skilled information professionals providing the best, most authoritative information to clients. Now, you have to take a more strategic approach to the role of the knowledge center within your larger organization.
Tags : 
factiva, enterprise, mobile, knowledge center, knowledge management, enterprise applications
    
Factiva
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
    
Flexera
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
There is a crisis in enterprise communications and collaboration, due in large part to the diversity of technology and application silos that create user complexity and confusion. As cloud and mobile become the convergence points for enterprise communications and collaboration, enterprise planners have to focus on a global open cloud strategy to facilitate effective internal and external collaborative business workflows
Tags : 
cloud, open cloud strategy, mobile, workflow, enterprise planning
    
8x8 Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth. Among the most promising objectives of such a strategy are: • Providing superior digital experiences for consumers though mobile • Expanding markets and revenue streams through multiple channels • Connecting employees and partners to enterprise data anywhere, anytime • Launching innovative new services for the Internet of Things (IoT) Successfully executing a digital strategy requires the ability to launch new apps and coordinate your digital presence with partners. Application Programming Interfaces (APIs) create the connectivity required to share enterprise data and digital content with those apps and partners over the Internet. APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your dat
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: Adobe     Published Date: Apr 04, 2018
The key—gleaned from the design practices of mobile leaders—is to balance a human vision with rigorous and focused execution. Sounds obvious? Maybe, but it’s rare to find organizations that do the full process the right way. Here’s what everyone who works on mobile products can learn from the mobile market leaders:
Tags : 
    
Adobe
Published By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
OKTA
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com