mobile strategies

Results 1 - 25 of 104Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Financial Force     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
Financial Force
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: Adobe     Published Date: Nov 09, 2017
Differentiation through customer experience. That’s the number one way retailers who answered Econsultancy’s Digital Trends report plan to compete this year. And many think mobile and virtual and augmented reality (VR and AR) devices are the tools to help get the job done. Read the Econsultancy report, Digital Intelligence Briefing: 2017 Digital Trends in Retail, and learn: How retailers around the world rate their digital experience abilities Where they’ll prioritize digital investments, and why mobile tops the list Why they said VR and AR are the most exciting engagement strategies
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
See your peers' biggest priorities, most important KPIs, and marketing spending for mobile devices and experiences. WHY SHOULD THE TARGET AUDIENCE CARE? Between September and October 2017, Adobe surveyed close to 500 marketers and IT professionals to explore current mobile trends and priorities, get a glimpse of where they're going with their mobile efforts, and learn what the most advanced organizations are doing to create the next wave of transformative mobile experiences. Read our findings and see how mature your mobile strategies are in comparison to your peers'.
Tags : 
    
Adobe
Published By: Adobe     Published Date: May 04, 2018
Mobile capabilities have grown up. Strategies should, too. Over the last ten years, smartphone usage among adults has grown to 95 percent. Surprisingly, 90 percent of marketers say they’ve only had a mobile strategy for five years or less. Read The Next Mobile Decade: Adobe 2018 Mobile Maturity Study, and learn: - How 500 marketing and IT professionals tackled mobile marketing last year - Which mobile strategies the most advanced organizations put into practice - What you can do to make your brand a mobile leader in the next decade Fill out the form to get the report.
Tags : 
    
Adobe
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies
    
CA Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 09, 2017
ENGAGE AND SATISFY FINANCIAL SERVICES CUSTOMERS In order to stay relevant and retain today’s “always-on”, mobile customers, financial institutions must prioritize and innovate. According to a recent Akamai FinServ industry survey conducted by TechValidate, almost half of the respondents are “behind” or “slightly behind” their peers with regard to their mobile capabilities. Download a free report with detailed findings and takeaways from the survey to find out how to maximize customer acquisition, increase retention, and drive card usage. You’ll also learn: - Current mobile strategies and barriers to adoption - The right metrics to measure success - The most important factors in a mobile banking experience
Tags : 
financial services customer engagement, customer service, mobile customers, akamai, mobile strategies, mobile banking
    
Akamai Technologies
Published By: Adobe     Published Date: Jul 31, 2013
This paper compares some of the issues to consider when evaluating app production platform like Digital Publishing Suite, versus custom app development.
Tags : 
digital publishing, mobile strategies, app development, dps apps
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Mobile platforms will act as a catalyst for the next generation of connected experiences. In particular, smart apps connected to products and CRM systems will emerge. In 2013, leading marketers will anticipate the longer-term mobile disruption and shift from tactical efforts to more transformative mobile strategies.
Tags : 
adobe, forrester, mobile trends, interactive marketing professionals, marketing control, mobile platforms, crm systems, transformative mobile strategies, consumer behavior, ubiquity drive, mobile mind shift, mobile momentum, scaled-up investments
    
Adobe
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Adobe     Published Date: May 13, 2015
The survey offers a big picture view of the investments in mobile by leading marketers—and what it will take to stay on top. Read on and find out where you stand.
Tags : 
investing in mobile marketing, mobile engagement strategies, mobile marketers, mobile investmentments, internet marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
The survey offers a big picture view of the investments in mobile by leading marketers—and what it will take to stay on top.
Tags : 
investing in mobile marketing, mobile engagement strategies, mobile marketers, mobile investmentments, internet marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : 
mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : 
mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : 
mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
    
Adobe
Published By: Adobe     Published Date: Feb 10, 2016
This white paper reveals how business are using mobile today.
Tags : 
mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
    
Adobe
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: