Business of Information Technology  >   Business Processes  >   eCommerce  >  

Mobile eBusiness

RSS Feed    Add to Google    Add to My Yahoo!
Mobile eBusinessReports
 
Create a strong, dynamic customer experience
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, learn how retail businesses should leverage technology to gather more customer info, implement the appropriate changes to their services, and create a more enjoyable shopping experience. Click now to see how to manage and maximize opportunity from omni-channel services.
Posted: 20 Jan 2014 | Published: 30 Nov 2012

Hewlett-Packard Company

Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

How Mobile Management Services Fill a Critical Security Need
sponsored by Global Knowledge
WHITE PAPER: For organizations considering Mobile Management Services (MMS), such an increase demonstrates why it's critical to address MMS adoption and deployment now, before unchecked proliferation can cause serious problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Global Knowledge

The Ten Principals of BYOD
sponsored by IBM
WHITE PAPER: Uncover the top ten Bring Your Own Device (BYOD) considerations to keep in mind when composing a BYOD policy to ensure a productive and secure environment which allows your employees to use their consumer-based devices to complete day to day tasks.
Posted: 03 Sep 2014 | Published: 28 May 2014

IBM

How to Achieve a Stream-lined Enterprise Mobility Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive white paper examines an in-depth look at an enterprise mobility solution that can help your organization meet the constant demands of end-users on the network.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CA Technologies.

Choosing a Secure Workspace Approach
sponsored by Dell Software
WHITE PAPER: Learn how to choose a secure workspace solution that enables you to maintain security, reduce IT complexity and still deliver the responsiveness and flexibility your employees need for anytime, anywhere productivity. Read this insightful white paper for details.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell Software

Enable Secure Access to Apps
sponsored by IBM
DATA SHEET: The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

IBM

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

IBM CIO Office
sponsored by IBM
CASE STUDY: This exclusive case study takes an in-depth look at how one office was able to on-board 15,00 devices during the first day of deployment. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
sponsored by Symantec
WHITE PAPER: This white paper briefly reviews the top six threats to your mobile workforce, matching real-world hazards with really helpful ways you cantake action and achieve the security your business requires.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement