mobile application strategy

Results 1 - 25 of 29Sort Results By: Published Date | Title | Company Name
By: OutSystems     Published Date: Mar 18, 2015
In this white paper we describe the top four issues that cause mobile projects to fail and outline a path that can take you safely around these common pitfalls and put you on track to delivering a powerful, flexible mobile application strategy.
Tags : application development, mobile app development, mobile app pitfalls, a guide to mobile app success, application performance management, best practices
     OutSystems
By: Adobe     Published Date: Feb 20, 2014
Adobe collaborated with Forbes Insights on this study in order to shed light on new mobile engagement opportunities: How are companies using apps, whether they are aimed at customers, employees or partners? What are the lessons learned so far? And what are best practices for using mobile and tablet apps?
Tags : forbes, adobe, mobile marketing, mobile applications, apps. mobile apps, digital marketing, customer engagement, marketing strategy
     Adobe
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications
     Veracode
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Tech     Published Date: Jan 04, 2016
This white paper illustrates how Mobile application analytics can play a vital role in your DevOps strategy that can help your company create a superior end-user experience. Providing deep insight, this discipline produces benefits for a variety roles across the organisation.
Tags : customer experience, mobility, mobile application, mobile app, mobile application analytics, devops, application management, mobile computing
     CA Tech
By: Enterprise Mobile     Published Date: Oct 09, 2013
Enterprise app decisions may be some of the most important decisions you make. This brief will help guide your organization by providing valuable insight on delivering, supporting and securing mobile apps.
Tags : mobility-as-a service, managed mobility services, mobile application management, mam, apps, enterprise mobile, mobility, enterprise mobility
     Enterprise Mobile
By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
     Box
By: MicroStrategy     Published Date: Mar 15, 2011
This free, one-day course covers an introduction to Mobile BI Applications and Mobile App architecture, interactivity and design techniques, and how to develop and deploy a fully-functional Mobile App. Students will spend the afternoon session exploring MicroStrategy software with hands-on, instructor-driven exercises.
Tags : microstrategy mobile class, bi application, business intelligence, mobile app architecture, mobile computing, mobile data systems, mobile workers, smart phones
     MicroStrategy
By: CDW     Published Date: Oct 10, 2013
Five key items can help reap solid ROI from launching a mobile application strategy. Organizations are demonstrating their interest in mobile apps with their checkbooks.
Tags : increase revenue, mobile apps, apps, mobility, mobile device, trademonster, productivity with apps, customer relationships management
     CDW
By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
     VMware
By: OutSystems     Published Date: Apr 10, 2014
This eBook looks at how to kick start your mobile application strategy. Download to learn more!
Tags : outsystems, mobile app strategy, mobile, mobile applications, types of apps, it management
     OutSystems
By: MuleSoft     Published Date: Oct 13, 2015
This paper reviews the primary drivers for mobile initiatives, the challenges faced by CIOs trying to initiate or support a mobile strategy, and the transformation stories of three market leaders who enabled mobility via API-led connectivity.
Tags : mobile applications, api-led connectivity, consumer experience, enterprise mobile strategy, enterprise applications
     MuleSoft
By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development
     CDW
By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
     VMware
By: 2ergo     Published Date: Apr 09, 2010
With close to 40 million smartphone owners and more than 3 billion applications downloaded, the potential of smartphone applications as brand builders and money makers is real! 2ergo's experienced team serves as the first choice for leading brands looking to launch smartphone applications, and we are ideally positioned to help you integrate mobile applications as part of your overall digital marketing strategy.
Tags : 2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps
     2ergo
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications, mobile computing
     IBM
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
     IBM
By: Localytics     Published Date: Apr 16, 2013
In this eBook you will learn about the right way to engage users with mobile app marketing with the best practices of in-app messages.
Tags : in-app messaging, appstore, mobile apps, mobile experience, user experience, mobile application marketing, mobile application strategy
     Localytics
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.