Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Research // Nov 2014

    Master Mobile By Focusing on Productivity

    View this infographic and learn how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective. By mastering mobility, IT teams play a key role in boosting productivity, efficiency, and ROI across the business.

    Sponsored By Box

  • Research // Nov 2014

    Secrets to Better Engage the Mobile Consumer: The Role of Push Notifications

    Today’s consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications...

    Sponsored By IBM

  • Research // Nov 2014

    Busting Myths About Mobility

    Innovations in mobile computing have radically changed the way we interact. Now they’re changing the way we do business. While many companies still see mobile solutions as too costly, risky or hard to manage, organizations that see beyond these misconceptions gain access to tremendous possibilities across the enterprise. Dell found...

    Sponsored By Dell and Intel

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Sponsored By Dell and Intel

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Sponsored By MobileIron

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    ZK Research 2014 - Best Practices for Building a Mobility Strategy

    Granting you employees mobile access can have major business benefits. But realizing those benifits is no longer only about providing simple device access. Now it's about facilitating great user experiences, increasing productivity and maintaining the security of your business through it all. Download this new ZK Research white paper and...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • Research // Aug 2014

    Gartner’s Best Practices for Implementing Automation

    Follow a systematic approach. Opportunistic implementations may backfire, leading to incompatibilities and added expense and risk. Read Gartner’s advice for maximizing the benefits of data center automation.

    Sponsored By HP

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Provided By Webroot

  • Research // Sep 2014

    IDC Server Innovation for Enterprise Datacenters

    With IT environments growing in size, scale, and complexity, CIOs and IT managers are supporting mission-critical business processes with demanding service-level agreements (SLAs) for internal and external customers. This IDC research examines the primary benefits of working with vendors investing in solutions that can process, support, and manage mission-critical...

    Provided By Dell and Intel®

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Jun 2013

    Top Considerations for a Unified Communications Purchase

    A report from ZK Research provides relevant decision criteria to help organizations make the best Unified communications (UC) decision possible. Unified communications has been a continually evolving market for the past decade. UC was initially centered on voice over IP (VoIP) and unified messaging, but has expanded significantly over the...

    Provided By Cisco Systems, Inc

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Nov 2012

    BYOD: Fueling Mobile Growth, Employee Innovation

    A recent Cisco survey shows that 89% of IT departments worldwide enable BYOD, proving it's a global trend for which IT must prepare. What are the security challenges? The benefits? Learn why the world is drawn to a more flexible network.

    Provided By Cisco

  • Research // Oct 2012

    Windows 8: From preview to release

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing....

    Provided By ZDNet

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Nov 2011

    BYO Device: How to handle consumer gadgets in your workplace

    Workers are no longer willing to let the business decide what devices they should use to get their jobs done most effectively. Whether it's smartphones, laptops, netbooks or even tablets, many workers are insisting on using their own devices to connect to sensitive systems inside your organisation. Allowing workers to...

    Provided By silicon.com

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Jan 2010

    Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

    Compares the KBOX? family of appliances from KACE with leading competitors Altiris, LANDesk, and Microsoft. It explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.

    Provided By KACE

  • Research // Sep 2014

    ZK Research 2014 - Best Practices for Building a Mobility Strategy

    Granting you employees mobile access can have major business benefits. But realizing those benifits is no longer only about providing simple device access. Now it's about facilitating great user experiences, increasing productivity and maintaining the security of your business through it all. Download this new ZK Research white paper and...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • Research // Aug 2014

    Gartner’s Best Practices for Implementing Automation

    Follow a systematic approach. Opportunistic implementations may backfire, leading to incompatibilities and added expense and risk. Read Gartner’s advice for maximizing the benefits of data center automation.

    Sponsored By HP

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Sponsored By MobileIron

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • Research // Nov 2014

    Secrets to Better Engage the Mobile Consumer: The Role of Push Notifications

    Today’s consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications...

    Sponsored By IBM

  • Research // Nov 2014

    Master Mobile By Focusing on Productivity

    View this infographic and learn how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective. By mastering mobility, IT teams play a key role in boosting productivity, efficiency, and ROI across the business.

    Sponsored By Box

  • Research // Nov 2014

    Busting Myths About Mobility

    Innovations in mobile computing have radically changed the way we interact. Now they’re changing the way we do business. While many companies still see mobile solutions as too costly, risky or hard to manage, organizations that see beyond these misconceptions gain access to tremendous possibilities across the enterprise. Dell found...

    Sponsored By Dell and Intel

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Sponsored By Dell and Intel

  • Research // Jan 2010

    Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

    Compares the KBOX? family of appliances from KACE with leading competitors Altiris, LANDesk, and Microsoft. It explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.

    Provided By KACE

  • Research // Sep 2014

    IDC Server Innovation for Enterprise Datacenters

    With IT environments growing in size, scale, and complexity, CIOs and IT managers are supporting mission-critical business processes with demanding service-level agreements (SLAs) for internal and external customers. This IDC research examines the primary benefits of working with vendors investing in solutions that can process, support, and manage mission-critical...

    Provided By Dell and Intel®

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Jun 2013

    Top Considerations for a Unified Communications Purchase

    A report from ZK Research provides relevant decision criteria to help organizations make the best Unified communications (UC) decision possible. Unified communications has been a continually evolving market for the past decade. UC was initially centered on voice over IP (VoIP) and unified messaging, but has expanded significantly over the...

    Provided By Cisco Systems, Inc

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Nov 2012

    BYOD: Fueling Mobile Growth, Employee Innovation

    A recent Cisco survey shows that 89% of IT departments worldwide enable BYOD, proving it's a global trend for which IT must prepare. What are the security challenges? The benefits? Learn why the world is drawn to a more flexible network.

    Provided By Cisco

  • Research // Oct 2012

    Windows 8: From preview to release

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing....

    Provided By ZDNet

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Nov 2011

    BYO Device: How to handle consumer gadgets in your workplace

    Workers are no longer willing to let the business decide what devices they should use to get their jobs done most effectively. Whether it's smartphones, laptops, netbooks or even tablets, many workers are insisting on using their own devices to connect to sensitive systems inside your organisation. Allowing workers to...

    Provided By silicon.com

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Provided By Webroot