mobile

Results 1 - 25 of 4248Sort Results By: Published Date | Title | Company Name
Published By: SADA     Published Date: Oct 25, 2019
To compete in a digital economy, todays leaders must give their teams the right skills and tools to succeed. Made for a mobile, global workforce, G Suite unlocks teams full potential for innovation by opening up new ways of collaborating so that people can achieve more together. When teams use G Suite, they can react at a moments notice, generate breakthrough ideas, and maintain a shared purpose. Read this whitepaper to find out more.
Tags : 
    
SADA
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way todays modern business operates. Theyve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware. While malwares pervasiveness may not come as a surprise to many people, whats not always so well understood is that automating app attacksby means of malicious bots is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interactionwebsite visits, API calls to mobile apps, and othersis being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But thats not all: theyre also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiencesperhaps a chatbot provides instant customer assistance on your site. Whats important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Readings survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: how consumer expectations are shifting on the topic of digital trust how well the priorities of consumers and security executives align what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Todays customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: how to create customer-centric operations to deliver the customer experience the eight essential components of a connected, customer-centric enterprise why alignment between the COO and CIO is essential five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Oracle     Published Date: Sep 26, 2019
We live in a data-rich world. From visitor behavior on websites and social media interactions to mobile app usage and device communications across the Internet of Things, brands are inundated with data.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2019
Todays consumers are demanding: They have become more unforgiving of a poor customer experience and expect interactions on their desktop and mobile devices to be responsive, intuitive, and easy-to-use. Marketers understand that delivering the most relevant experience is the key to gaining continued satisfaction and loyalty from their digital consumers.
Tags : 
    
Oracle
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
    
SDL
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
You've seen them, and you fear them. Now let us show you how to be cleaned of them. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Sophos makes it easy to secure and manage your mobile devices.
Tags : 
    
Pine Cove Consulting
Published By: Ricoh US     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
    
Ricoh US
Published By: MicroStrategy     Published Date: Nov 06, 2019
Mobile devices are part of nearly everything we do in life.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
With trends such as big data, artificial intelligence and IoT dominating todays business technology headlines, the buzz around enterprise mobility (now considered known and familiar) may have lessened, but its importance has not. Consider its key role in todays top tech trends, and then also consider this. According to an Oxford Economics survey of 500 senior IT executives, CEOs, and other senior managers, 80% say workers cannot do their jobs effectively without a mobile device. The same survey shows: 82% say mobile devices are critical to employee productivity 82% say mobile devices are critical to agility and the speed of decision making 76% say mobile devices are critical to customer service and satisfaction 75% say mobile devices are critical to innovation and collaboration 70% say mobile devices are critical to employee satisfaction and 70% say mobile devices are critical to revenue growth. The known and familiar now demands a fresh look and focus from enterprise organizatio
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
With trends such as big data, artificial intelligence and IoT dominating todays business technology headlines, the buzz around enterprise mobility (now considered known and familiar) may have lessened, but its importance has not. Consider its key role in todays top tech trends, and then also consider this. According to an Oxford Economics survey of 500 senior IT executives, CEOs, and other senior managers, 80% say workers cannot do their jobs effectively without a mobile device. The same survey shows: 82% say mobile devices are critical to employee productivity 82% say mobile devices are critical to agility and the speed of decision making 76% say mobile devices are critical to customer service and satisfaction 75% say mobile devices are critical to innovation and collaboration 70% say mobile devices are critical to employee satisfaction and 70% say mobile devices are critical to revenue growth. The known and familiar now demands a fresh look and focus from enterprise organizatio
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Mobile devices are part of nearly everything we do in life. Two-thirds of the world's population is connected via one of these devices; in 2020 there will be 6.95 billion mobile users worldwide, according to Statista forecast. Apple iOS and Google Android mobile devices provide on-the-go access to the vast array of applications and information that people have come to rely on. In the next decade the use of mobile devices gain intelligence likely will significantly change how an organization does its work.
Tags : 
    
MicroStrategy
Published By: Ahead     Published Date: Aug 27, 2019
Digital Business Demands Better Software, Faster In your organization, youve probably heard questions like these asked of the application development and/or infrastructure and operations organizations. > Why cant our software development teams keep up with new business requirements? > Why are we always waiting on infrastructure teams? > Why do our business initiatives become outdated before their required software is even deployed? > Is our software development team aligned with corporate goals like engaging younger consumers on their mobile devices?
Tags : 
    
Ahead
Published By: Quantum Metric     Published Date: Oct 18, 2019
Attaining your customers undivided attention is a key challenge for any online business. This challenge is amplified, however, when they explore your brand via their mobile device. Using Quantum Metrics unique dataset, this infographic showcases the importance of keeping your mobile visitors engaged. Mobile visitors purchase 4X less than desktop visitors among Fortune-500 companies.
Tags : 
    
Quantum Metric
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniquesas well as opportunitiesto steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud preventionone that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
We see a counterintuitive future whereby better security no longer means a more complicated or cumbersome user experience. We see a future in which users happily take control of their privacy, out-of-band mobile MFA is the norm, and nobody suffers the fallout from the last major credential breach. This future is free of sticky notes with scribbled codes and centralized credential stores. Indeed, its free of passwords altogether.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: Panasonic     Published Date: Oct 10, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agencys mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Oct 10, 2019
Wireless communications is on the cusp of the 5G revolution, which is widely touted as a boon for business and consumers. Change is coming, and that heralds significant challenges for government and its use of both fixed and mobile wireless networks. Here are six things agencies should know now about 5G.
Tags : 
    
Panasonic
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.