HIT Consultant Insightful coverage of healthcare innovation
 

mobile erp

Results 576 - 600 of 743Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: Cision     Published Date: May 02, 2016
The state of the media in 2015 was social, mobile and multiplatform. But as the way journalists engage with their audiences continues to evolve in the face of technological disruption, the most productive relationships between the media and communication professionals remain founded on the fundamentals which have always underpinned public relations best practices. Informed by a survey of 346 journalists, bloggers and influencers and supplemented with insights from Cision’s Media Research Team, Cision’s State of the Media 2016 Report takes a look back at the trends that shaped 2015 and anticipates the next public relations challenges.
Tags : 
cision, public relations, media, social, mobile, multiplatform
    
Cision
Published By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Deployment is an often-overlooked area of a company’s mobile strategy. Get it right, and your employees are off and running without a second thought. Get it wrong, and your mobile initiatives will suffer.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile deployment
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Deployment is an often-overlooked area of a company’s mobile strategy. Get it right, and your employees are off and running without a second thought. Get it wrong, and your mobile initiatives will suffer.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile deployment
    
Enterprise Mobile
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: Zebra Technologies (Bulldog)     Published Date: Sep 19, 2016
In this whitepaper we discuss the reasons for app migration, the process organizations need to go through, the choices they need to make and the ways to successfully navigate through the process.
Tags : 
mobile apps, zebra technology, next generation platforms, modern enterprise, mobile devices
    
Zebra Technologies (Bulldog)
Published By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
Published By: Concur     Published Date: Aug 15, 2017
As travel and expense (T&E) management solutions have improved, the expectations of the end user are higher than ever before. Business travellers want a seamless experience and you want better visibility, increased compliance, and reduced spend. Our research identified two types of people – Leaders and Followers. Leaders have most of their spending under management, have increased compliance to company policies and approve expense reports more quickly. Followers are lagging behind.
Tags : 
platform, travel, payment, expense management, mobile app, corporate budgets, trip cost visibility, enterprise
    
Concur
Published By: Citrix Systems     Published Date: Nov 10, 2014
Don't let poor performance and inadequate security constrain your enterprise mobility initiatives. Accelerate and protect your mobile workspaces with innovative NetScaler MobileStream technology from Citrix.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization
    
Citrix Systems
Published By: Panasonic     Published Date: Aug 04, 2016
Field service organizations are leveraging mobile technology to enhance their service capabilities and provide more value for their customers. Mobility is the new normal for enterprise, line-of-business applications like field service. If your organization still relies on manual data entry or paper-based processes, or if your mobile technology is aging and out of date, you have put your own business at a competitive disadvantage.
Tags : 
mobility, mobile computing, enterprise, technology, efficiency
    
Panasonic
Published By: Citrix     Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
enterprise mobile, executive checklist, security, byod
    
Citrix
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade
    
CDW
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to move beyond single task apps and enable the app workflows that help keep your mobile workforce productive and secure.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, business case
    
Good Technology Corporation
Published By: IBM MaaS360     Published Date: Apr 15, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Tired of hearing all the ways you need to go “mobile” and all the ”things” it can do for your business. Don’t buy the hype, here’s a list of perfectly valid reasons fast and secure mobile deployment and management is a bunch of hullabaloo and poppycock.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: Citrix     Published Date: Jul 25, 2014
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : 
secure, mobility, management, checklist
    
Citrix
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : 
citrix, security, enterprise, mobility
    
Citrix Systems, Inc.
Published By: Iterable     Published Date: Nov 28, 2018
With the rise of consumer demands for highly personalized products and services comes the necessity of creating a unified brand experience. Research shows that a cross-channel marketing strategy delivers 3X more effective campaigns and 23X higher rates of customer satisfaction. In Iterable’s Cross-Channel Engagement Benchmark Report, we demonstrate that brands continue to prioritize email above mobile, web and direct mail messaging. We surveyed 200+ Iterable customers (49% Enterprise & 51% Mid-Market) to learn which channels and campaigns had the most success in 2018. To find out the results, download a copy of our hot-off-the-press — 2018 Cross-Channel Engagement Benchmark Report. The Top Takeaways: • The status quo when it comes to B2C marketing outreach • How marketers are engaging customers throughout the lifecycle • Expert commentary from our partners and customers
Tags : 
    
Iterable
Published By: BlackBerry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
Blackberry
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.