Skip to main content
 

mobile device

Results 401 - 425 of 1286Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
At IBM Watson Marketing, we believe deeply in this practice and have dedicated a large effort to provide some of this critical data to marketers. The newest IBM Watson Marketing annual report of marketing benchmarks is bigger and better than ever with mobile marketing metrics data in addition to email marketing metrics. This year’s report includes traditional benchmark metrics such as email marketing open, click-through and unsubscribe rates, as well as email client and device data and engagement/read rates. New this year to the report are delivery and message frequency metrics for SMS and open and clickthrough rates for mobile push messages.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: MindTouch     Published Date: Mar 18, 2019
Today, the average person has instant access to an immeasurable quantity of information. Smartphones and mobile devices put it all at one’s fingertips. It is part of an unprecedented shift that puts customers squarely in the driver’s seat. As a result, the balance of power has decisively shifted from sellers to buyers—from products and services to the customers who consume them. Companies now face a simple but critical choice: prioritize the customer experience, or risk going by the wayside. The companies that thrive are those that obsess over proactively meeting customer demand for timely and effortless experiences.
Tags : 
    
MindTouch
Published By: Oracle OMC     Published Date: Oct 26, 2018
Mobile Device and Audience Testing: Difference between mobile, web, and apps 4 steps to Shaping Mobile Experience The Nuts & Bolts of Testing 7 Ways to Speed Development Time for Your Tests
Tags : 
    
Oracle OMC
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: HP     Published Date: Jul 03, 2014
A Viewpoint paper on learning how your enterprise can become mobile
Tags : 
enterprise mobility, mobile workers, mobile devices, byod
    
HP
Published By: Oracle OMC     Published Date: Nov 30, 2017
Today’s consumers are demanding: they have become more unforgiving of a poor customer experience and expect interactions on their desktop and mobile devices to be responsive, intuitive, and easy to use. Marketers understand that delivering the most relevant experience is the key to gaining continued satisfaction and loyalty from their digital consumers. Oftentimes, however, when it comes to marketing to consumers there are two dynamics. On one hand you have what consumers say they want out of a customer experience. On the other hand, there is what they actually receive. What they want are experiences that are personalized, contextually relevant, and consistent— regardless of online or offline channel or lifecycle stage. What they too often get, however, are experiences that are disconnected, not contextually relevant, and inconsistent across channels and lifecycle stages.
Tags : 
    
Oracle OMC
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
Entrust Datacard
Published By: SAS     Published Date: Apr 16, 2015
Few advances in technology have impacted how we do business as broadly and profoundly as mobile. Mobile devices are creating new opportunities for organizations to engage with their customers, but the bigger reasons to focus on mobile relate to how mobile is changing how people behave. For marketers, the opportunities lie beyond the simple lure of mobile as just another channel to engage with customers. Because mobile devices are highly valued and always present, they bring a unique complexity that is not associated with email, digital or other channels of engagement.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 21, 2015
Because mobile devices are highly valued and always present, they bring a unique complexity that is not associated with email, digital or other channels of engagement.
Tags : 
    
SAS
Published By: ESET     Published Date: Sep 07, 2011
We discuss about Internet users' behaviour when it comes to Internet security and the top ten threats of the month.
Tags : 
eset, threat report, internet security, malware industry, antivirus, cybercrime group, mobile devices
    
ESET
Published By: LogMeIn     Published Date: Oct 06, 2016
This report examines customer engagement with organisations via mobile devices.
Tags : 
mobile, mobility, mobile engagement, customer engagement, customer experience
    
LogMeIn
Published By: Box     Published Date: Nov 28, 2012
This IDC Insight explores the emerging category of solutions that offer access to business content (folders, files, documents, etc.) on mobile devices.
Tags : 
collaboration, collaboration solutions, mobile workforce, mobility, mobile workers, mobile enterprise
    
Box
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
virtualization, collaboration, enterprise applications, cloud computing, mobility management, mobile collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : 
bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Companies today can’t just “bolt on” mobile capabilities. To succeed, you have to put mobile first. Read—Moving Beyond BYOD to Mobile First: A 3-Step Approach for CIOs—to learn how a making mobile a core part of your IT strategy increases revenue.
Tags : 
mobile collaboration, byod management, byod solutions, byod strategy, enterprise collaboration, enterprise mobility, mobile device management
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You can’t slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. You’ll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Published By: Brainshark     Published Date: Oct 16, 2013
With the proliferation of the iPad and other tablets and mobile devices among sales and account managers, a new generation of enabling technologies and best practices has offered the opportunity to get more out of the out-of-office experience. This research brief examines the use of video tools by sales professionals within best-in-class companies, specially within a mobile environment.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing
    
Brainshark
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.