mobile organization

Results 51 - 75 of 411Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems
    
VMware AirWatch
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : 
data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
    
Dell & Microsoft
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed
    
CA Technologies
Published By: MobileIron     Published Date: Feb 05, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : 
mobile apps, best practices, mobiletron, phones
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : 
mobile apps, best practices, mobiletron, phones
    
MobileIron
Published By: MobileIron     Published Date: Sep 26, 2017
The shift toward modern mobile-cloud technologies is forcing organizations to completely rethink their approach to endpoint security. For instance, while credential-based security is enough to secure access in an IT-controlled desktop environment, it doesn’t transfer to the mobile-cloud world
Tags : 
mobileiron, mobile, cloud, enterprise, security, endpoint security
    
MobileIron
Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
Published By: OutSystems     Published Date: Oct 12, 2015
This complete kit provides a proven process and customizable documents that will help you evaluate rapid application delivery platforms and select the ideal partner for building mobile and web apps for your organization.
Tags : 
outsystems, application delivery, platform, mobile app, web app, rad
    
OutSystems
Published By: VMware     Published Date: Jan 23, 2018
The digital workspace has arrived, and the most progressive organizations are taking action. To thrive in this digital environment, organizations need to embrace strategies that better prepare them for success in the growing digital economy. Understandably, this means working toward becoming highly mobile enterprises. Throughout this process, an organization’s technology partner choices can play a pivotal role in achieving business goals. As such, stability and scalability are taking center stage. This is why a forward-looking solution can empower an organization to move away from standalone enterprise mobility management (EMM) to the digital workspace. In this white paper, we’ll take a look at how the mobility ecosystem is evolving and how organizations can push the boundaries of enterprise mobility while making the most of their investments. For MobileIron customers making a migration decision, selecting a partner with solid leadership, stability, scalability, and steady growth wil
Tags : 
    
VMware
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management. As we receive inquiry on this area increasingly, it makes sense to assess this market.
Tags : 
    
CA Technologies EMEA
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Oracle Analytics     Published Date: Oct 06, 2017
Empowered with mobile and cloud-based access to a myriad of products and services, customers now have a variety of options at their fingertips with regards to partnerships. Enterprises that do not follow the ever-changing tastes and preferences of their customers, or that wait too long to react, will fall behind and fail. Across functions, business professionals readily require big data tools and insights to understand and serve these customers. It is no longer an option for business users to rely on IT to deliver customer and other relevant analytics. On the flipside, handing the analytics reins entirely to business users can make governance nearly impossible. Organizations must find balance in a new approach in which IT mostly governs and curates data while business users are empowered to derive insights from data mostly ontheir own without delay.
Tags : 
    
Oracle Analytics
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
With the modern workforce becoming more mobile, geographically disperse and digital, HR is looking for innovative solutions to modernize employees experiences. Discover a quick roadmap to deliver a digital workplace for your organization.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The year 2011 ended with a staggering 5.9 billion mobile phone subscriptions, especially significant considering that the total world population is around 7.011 billion. Of course, a direct comparison is not fair since many people have multiple subscriptions, but it represents a window into the pervasiveness of these devices and how they are an integral part of people’s lives today. For enterprises, this also represents the impending end to the old computing era and the emergence of the mobile worker. Enabling mobility in the workplace is a top-of-mind goal for decision-makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies to manage the “bring-your-own-device” (BYOD) trend.
Tags : 
mobile phones, mobility, it management
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : 
mobility, financial services, revenue stream, application development
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.