Skip to main content
 

mobile it

Results 1 - 25 of 2819Sort Results By: Published Date | Title | Company Name
Published By: MobileSmith     Published Date: May 19, 2014
- The 4 must-haves of a great patient engagement mobile app - Six steps to develop an efficient and compelling patient app use case - How you, the marketer, can quickly launch a sustainable mobile app portfolio that drives patient engagement
Tags : 
    
MobileSmith
Published By: MobileSmith     Published Date: Jan 26, 2015
• Efficient mobile strategies for reducing hospital readmissions. • Three easy mobile use cases your organization can launch within weeks. • Six best practices for cost-effective patient- and physician-facing apps.
Tags : 
    
MobileSmith
Published By: Spok     Published Date: Dec 18, 2015
Hospital communications used to be a lot simpler. If you needed to find a doctor, you could dial 0 and the operators would connect you or send a page on your behalf. People communicated through paper charts, wrote key phone numbers on grease boards, and kept on-call schedules in binders. Some of this still happens today, but communications across healthcare have become progressively more convoluted. The use of diverse mobile devices (smartphones, tablets, pagers, Wi-Fi phones, etc.), and the rise in care complexity necessitating care team coordination mean more sophisticated communication technology is required.
Tags : 
    
Spok
Published By: Veracode     Published Date: Mar 03, 2016
HIMSS Analytics study sheds light on where the industry stands, where it needs to go.
Tags : 
    
Veracode
Published By: VMware     Published Date: Sep 12, 2019
As the nature of work continues to evolve, modern organizations face an ever-changing set of challenges. The consumerization of IT and an increasingly mobile workforce have created a generation of workers who interact with data and information in entirely new ways. If businesses want to keep their footing in this new landscape, they must respond in ways that allow them to stay both flexible and secure.
Tags : 
    
VMware
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: • how consumer expectations are shifting on the topic of digital trust • how well the priorities of consumers and security executives align • what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
You've seen them, and you fear them. Now let us show you how to be cleaned of them. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Sophos makes it easy to secure and manage your mobile devices.
Tags : 
    
Pine Cove Consulting
Published By: Ricoh US     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
    
Ricoh US
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Every company markets to consumers differently. From call centers to emails to apps and aggregator sites, orchestrating a relationship marketing strategy requires a bespoke collection of marketing technologies. Marketers have the budgets to spend on CRM, email, mobile and data management, but fitting these capabilities together and ensuring they work with legacy business systems is not easy.
Tags : 
    
Selligent Marketing Cloud
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
We see a counterintuitive future whereby better security no longer means a more complicated or cumbersome user experience. We see a future in which users happily take control of their privacy, out-of-band mobile MFA is the norm, and nobody suffers the fallout from the last major credential breach. This future is free of sticky notes with scribbled codes and centralized credential stores. Indeed, it’s free of passwords altogether.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: Panasonic     Published Date: Oct 10, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agency’s mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Oct 10, 2019
The U.S. military continues to develop its quick-strike potential, seeking greater capacity to project force globally, quickly and on several fronts simultaneously. Support services are integral to that effort, particularly in the area of logistics and asset maintenance. In its 2018 National Defense Strategy, the Department of Defense identified the development of “resilient and agile logistics” among its key modernization goals.
Tags : 
    
Panasonic
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.