mobile management

Results 101 - 125 of 794Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
US based automobile had multiple ServiceNow instances across multiple companies along with non-standardization of tools and processes. LTI helped in implementing end to end ServiceNow modules including ITSM, ITOM: Orchestration + Event Management thereby achieving high scalability in integrated processes across globe.
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
i. Brief – US based automobile had no asset management and CMDB discovery which lead to longer procurement lifecycles. LTI implemented end to end ServiceNow and operational support using global delivery model. Also helped in optimising integrations after reviewing license consumptions which then helped in reducing the process implementation to mere 2.5 months ii. Benefits 1. Hybrid process governance helped reduction in TCO by 25% 2. Reduction in number of licenses by 20% using integration with SharePoint
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The year 2011 ended with a staggering 5.9 billion mobile phone subscriptions, especially significant considering that the total world population is around 7.011 billion. Of course, a direct comparison is not fair since many people have multiple subscriptions, but it represents a window into the pervasiveness of these devices and how they are an integral part of people’s lives today. For enterprises, this also represents the impending end to the old computing era and the emergence of the mobile worker. Enabling mobility in the workplace is a top-of-mind goal for decision-makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies to manage the “bring-your-own-device” (BYOD) trend.
Tags : 
mobile phones, mobility, it management
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : 
mobility, financial services, revenue stream, application development
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: ClickSoftware     Published Date: Sep 24, 2012
This paper explores the business benefits that contractors can gain by adopting field workforce scheduling & optimization technologies.
Tags : 
field service management software, field service software, workforce management, field service management, service management software, field management software, field service scheduling software, mobile workforce management
    
ClickSoftware
Published By: Peoplefluent     Published Date: Apr 02, 2013
Today’s “connected” generation is comprised of tech-savvy workers whose strengths must be harnessed for competitive advantage. Read how to reach “Gen C” and develop talent management strategies to attract, engage and retain this workforce segment.
Tags : 
collaboration, generation c, talent management, mobile, social, social hcm software, talent management software, talent management strategies
    
Peoplefluent
Published By: Peoplefluent     Published Date: Apr 02, 2013
As competition for talent intensifies, take advantage of social technologies for recruiting. Learn how social and collaboration tools enhance, improve and reinvent recruiting processes, and best practices for developing a social recruiting strategy.
Tags : 
recruiting, recruiting software, social recruiting, social recruiting software, social collaboration, collaboration, social hcm, hiring software
    
Peoplefluent
Published By: ClickExpress     Published Date: May 01, 2013
Even if you have only 15 mobile workforce employees, you can reduce costs and improve the customer’s experience using optimization software. Today, it’s easy because you don’t even have to provide dedicated mobile devices to your field employees, just an app. But how do you avoid difficult transitions for workers, long implementation times, and solutions that don’t work as you really needed? This paper walks you through the 6 steps to successful decision making.
Tags : 
6 essential, mobile, workforce, management, software, customer, experience, optimization
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
Deploying a mobile workforce solution used to be a major undertaking. Today, it’s easy. You don’t need any specialized devices; management software is cloud-based, and training is short and simple. In other words, obstacles of the past have disappeared, and now is the time to implement mobile workforce solutions for organizations with between 15 and 250 mobile workforce. In this brief, you’ll see why it’s easier than ever to implement software solutions for mobile workforce.
Tags : 
mobile, workforce, solution, organizations, mobile, implement, software
    
ClickExpress
Published By: ClickSoftware     Published Date: Jun 30, 2014
Driving Change of Property and Casualty – Transform Your Customer Experience INSURERS ARE UNDERSTANDABLY EAGER to differentiate customer experience by automating mobile workforce management—especially when they can also cut operational costs, reduce carbon footprint, and streamline catastrophe response in the process. But this profound transformation in the daily lives of field claims and other mobile workers must be managed carefully to maximize benefits while minimizing disruption for all stakeholders.
Tags : 
clicksoftware, mobile, mobile workforce, property & casualty, workforce management
    
ClickSoftware
Published By: ClickSoftware     Published Date: Jun 30, 2014
Automating mobile workforce management can allow insurers to increase efficiency and improve service levels. When business is tough, that’s a great advantage
Tags : 
clicksoftware, mobile, mobile workforce, automation, casualty
    
ClickSoftware
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices.
Tags : 
mobile device management, enterprise mobility management, vendor landscape, it leaders, emm growth
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: Aternity     Published Date: May 18, 2015
Seven capabilities are required to address the complexity of delivering excellent enterprise mobile experience. Download this whitepaper to learn how.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.