mdm

Results 101 - 125 of 226Sort Results By: Published Date | Title | Company Name
By: Reltio     Published Date: Nov 20, 2018
Explore this 31-criteria, Forrester Wave Report on MDM platforms and vendors. You'll discover an evaluation of 12 vendors including leader Reltio with modern Master Data Management.
Tags : 
     Reltio
By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses, networking, security, enterprise applications
     Webroot UK
By: Microsoft Surface     Published Date: Feb 14, 2017
There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognizing the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.
Tags : 
     Microsoft Surface
By: Okta     Published Date: Aug 21, 2015
Enterprises are adopting Microsoft Office 365 in greater numbers. As part of deploying Office 365, IT teams are re-evaluating how they secure mobile access to email and apps as the data moves into the cloud. This guide provides a comparison between the free solutions offered by Microsoft and Okta for mobility management of Office 365 apps and data. Read this eGuide to learn more about the differences between Microsoft MDM and Okta Mobility Management for Office 365.
Tags : 
     Okta
By: Trillium Software     Published Date: May 19, 2011
Effective CRM demands a single, complete, accurate view of customer information including purchasing history, product interest, and support interactions. Enterprises require a solution to discover data issues, correct and standardize, and maintain data accuracy and consistency.
Tags : trillium software, single customer view, data quality, crm, customer relationship management, high-quality data, erp, mdm, soa
     Trillium Software
By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm, michele goetz, information maturity
     Trillium Software
By: Trillium Software     Published Date: Jun 06, 2011
Hear Andy Hayler from the Information Difference discuss these challenges as he presents the findings of his research report, "Building a Robust Business Case for High Quality Master Data".
Tags : trillium software, operational data quality, mdm solution, business case, andy hayler, high quality master data, post-implementation review
     Trillium Software
By: Trillium Software     Published Date: May 19, 2011
Effective CRM demands a single, complete, accurate view of customer information including purchasing history, product interest, and support interactions. Enterprises require a solution to discover data issues, correct and standardize, and maintain data accuracy and consistency.
Tags : trillium software, single customer view, data quality, crm, customer relationship management, high-quality data, erp, mdm, soa
     Trillium Software
By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm, michele goetz, information maturity
     Trillium Software
By: Trillium Software     Published Date: Jun 06, 2011
Hear Andy Hayler from the Information Difference discuss these challenges as he presents the findings of his research report, "Building a Robust Business Case for High Quality Master Data".
Tags : trillium software, operational data quality, mdm solution, business case, andy hayler, high quality master data, post-implementation review
     Trillium Software
By: Trillium Software     Published Date: Jun 29, 2011
This white paper highlights how BT's experience of IQIP can help to inform the challenge of organizing for enterprise wide DQ, lists the key organizational structures, outlines the roles of the potential main protagonists and summarizes the main lessons learned.
Tags : trillium software, data quality, mdm, master data management, british telecommunications, entreprise wide dq improvement program, data governance, nigel turner
     Trillium Software
By: HP     Published Date: Oct 02, 2009
Loraine Lawson spoke with David Loshin, president of the Washington, D.C.-based BI consultancy, Knowledge Integrity, and the author of Master Data Management, a book on MDM published by the MK/OMG Press, about how IT leaders separate out the marketing hype from what's really possible and pertinent about master data and managing it.
Tags : hp storage, business applications, information management methods, data management tools, knowledge integrity
     HP
By: IBM     Published Date: May 29, 2008
IBM Multiform Master Data Management manages master data domains - customers, accounts, products - that have significant impact on the most important business processes and realize the promise of Service Oriented Architecture (SOA). IBM is the only vendor that delivers an integrated MDM product with significant out-of-the-box functionality for each MDM usage style - collaborative, operational and analytical - across multiple data domains, thereby managing the complete data lifecycle.
Tags : data management, mdm, data lifecycle, master data management
     IBM
By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : ibm, enterprise master data management, corporate master data, data integration, enterprise applications, data management
     IBM
By: IBM     Published Date: Feb 02, 2009
The implementation of an information strategy is critical to your organization's business success and key to sustaining your competitive advantage. IBM’s Information Agenda has been specifically designed to help. Philip Howard of Bloor Research has helpful insights on getting started.
Tags : ibm, information strategy, competitive advantage, ibm information agenda, master data management, mdm, etl, extract, transform and load, lifecycle management, data completeness, information agenda, information accelerators, knowledge management, data management
     IBM
By: Sophos     Published Date: Dec 17, 2012
IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But convenience is always a trade-off with security.
Tags : byod, network security, mobile, security, buyer's guide, mdm, mobile device management, business technology
     Sophos
By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : security, vulnerability management, analytics, mobile security, byod, mdm
     CDW
By: Kaseya     Published Date: Nov 18, 2013
The BYOD trend is now mainstream and growing rapidly in acceptance. Gartner now estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.
Tags : kaseya, byod, technology trends byod, mobile, mobility, mdm, mobile device managment, it management, wireless
     Kaseya
By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, wireless, business technology
     Enterprise Mobile
By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, wireless, business technology
     Enterprise Mobile
By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
     MobileIron
By: VMware AirWatch     Published Date: Nov 12, 2015
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. « La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir, » déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prédit une nouvelle orientation dans la gestion de terminaux personnels qui consiste à gérer uniquement les applications pour répondre à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : mdm, containerization, security, enterprise mobility, enterprise applications, business technology
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : mdm, containerization, security, enterprise mobility, enterprise applications, business technology
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : mdm, containerization, security, enterprise mobility, enterprise applications, business technology
     VMware AirWatch
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security, business technology
     Webroot
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com