android

Results 1 - 25 of 96Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas
    
IBM APAC
Published By: VMware     Published Date: Jul 24, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware
Published By: Applause     Published Date: Jul 14, 2017
Learn tips, techiques and trends for launching great digital experiences that delight your users in our free guide.
Tags : 
mobile app testing, mobile applications, mobile application testing, software testing, functional testing, usability testing, usability studies, security testing
    
Applause
Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing
    
Harry lei
Published By: VMware AirWatch     Published Date: Jul 19, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware AirWatch
Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
10 Dinge, die IT-Administratoren zu ANDROID for Work wissen müssen.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
10 POINTS que tout administrateur doit connaître ANDROID FOR WORK.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: MobileIron     Published Date: May 12, 2015
Here are ten things IT administrators need to know about Android for work. Suggestions for maximizing effectiveness of a BYOD office environment.
Tags : 
android for work, it administrators, byod, office environment, mobile security
    
MobileIron
Published By: MobileIron     Published Date: May 12, 2015
This white paper will provide a technical overview as well as recommendations for IT organizations looking to accelerate Android adoption.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 22, 2014
Learn how BYOD drives the mobile enterprise transformation
Tags : 
mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone
    
MobileIron
Published By: MobileIron     Published Date: Apr 22, 2014
Download this white paper to learn how mobile technology is forcing a global enterprise transformation.
Tags : 
mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone
    
MobileIron
Published By: MobileIron     Published Date: Jul 03, 2014
Every year Gartner evaluates the enterprise mobility management vendors on their completeness of vision and ability to execute. This criteria is used to place vendors into one of four quadrants. For the fourth consecutive year MobileIron has been placed in the Leaders quadrant. According to Gartner, "The hallmark of leaders is that they focus and invest in their offerings to the point that they lead the market and can affect its overall direction." Download to learn more!
Tags : 
mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone
    
MobileIron
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Lookout     Published Date: Dec 09, 2016
Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : 
risks, mobile technology, enterprise, ios, android, lookout
    
Lookout
Published By: Microsoft     Published Date: Mar 31, 2017
Visual Studio 2015 hilft Ihnen dabei, großartige Ideen in großartige Geschäftsanwendungen zu verwandeln. Mit unserer flexiblen Cloudplattform und den für Unternehmen konzipierten DevOps-Tools können Sie nun noch einfacher skalierbare, hochmoderne Geschäftsanwendungen für jede beliebige Plattform (Web, mobile Geräte, Cloud oder lokal) entwickeln. Erstellen Sie mit der leistungsstarken Entwicklungsumgebung von Visual Studio beeindruckende Apps für Windows, Android, iOS und das Web. Arbeiten Sie über die Cloud zusammen – mit Versionskontrolle, Agilität, Continuous Delivery und App-Analysen sowie mit jeder beliebigen Programmiersprache und für jede beliebige Plattform.
Tags : 
mobile applications, mobile apps, ios, .net, devops, android
    
Microsoft
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management
    
Citrix Systems
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.