Mobility is a catalyst for disruption in the architecture, operations, and governance of today’s enterprise IT. 2015 gave us a major evolution in operating system architecture (Android for Work, Windows 10), the emergence of wearables (Apple Watch), and an expanded threat landscape (StageFright, XcodeGhost, YiSpecter).
This coming year will require a rethink of traditional security approaches as mobile and desktop merge and application modernization becomes a priority. This session provides a practical walk-through of the issues and potential initiatives CIOs must address as they plan for 2016.
Do you wish you had a Chief Mobile Officer to tell you how to manage iPhones, many different Android devices and various tablets in your organization? How do you go beyond email and leverage application & content on mobile devices? How do you protect your network and restricted data from a malicious mobile user...without compromising the mobile experience? Is Android the way to go? Is BYOD the way to go? Learn from an expert who has developed and implemented a successful enterprise mobile strategy for many companies including Fremont Bank, SanDisk and eBay/PayPal.Read more >
As employees choose smartphones and tablets for work, mobile apps become critical business tools. With recent mobile malware such as XcodeGhost, Stagefright, Key Raider, and YiSpecter, an unprecedented amount of mobile business data has been put at risk.
Join MobileIron’s Director of Security Research Mike Raggo for a discussion about where enterprises are coming up short in terms of mobile security. Raggo will share MobileIron insights about how often compromised devices access the enterprise network and which apps are the most commonly blacklisted by IT departments. He will outline the mobile threat landscape to understand why devices commonly fall out of compliance. This will provide the basis for listing steps enterprises can take to protect enterprise mobile data without sacrificing employee experience or productivity.
Mobile marketing consultant and trainer Rob Thurner will explain examples of new techniques to create effective mobile marketing experiences in 2014Read more >
Join to learn how to:
1. develop a messaging strategy based on "mobile moments"
2. intelligently message your guests "in the moment" based off where they are in their shopper journey
2. leverage a users context: where they are, where they’ve been, what they like and how they want to receive messages
3. use targeting to boost mobile message response rates four to seven times greater than non-targeted messages
Think about it - your customers have a very intimate relationship with their mobiles. Beware!
It’s amazing how many marketers still enthuse about their “mobile first” approach to digital. Sure, many of you will have over half your web traffic from mobile devices, and most of your social engagement of smartphones.
But what about the unique mobile customer?
Drawing on case studies from Amazon, Clever Cards, FT.com, Selfridges and Starbucks, this 45 minute session looks at how to deliver the best mobile customer experience in your sector.
- Create a great first impression - any screen, any time, any place
- Wow the early adopters - win the hearts & minds of your greatest fans and resellers
- Develop exceptional UX - across sites, apps
- Make it personal, keep them coming back for more - across the whole customer journey
Mobile devices are becoming the preferred platform for online banking, commerce and accessing business applications. In the recent Black Friday to Cyber Monday weekend, mobile devices accounted for 39 percent of online transactions. This increased reliance on mobile is driving an increase in fraud and cybercrime attacks through mobile devices, with organized cybercriminals deploying sophisticated attacks that exploit mobile technology.
Cybersecurity and fraud prevention professionals require defenses specifically designed to protect against losses and exposure from mobile attacks. Attend this webinar to understand how to protect transactions from native mobile applications and browsers in real time, without adding friction to the user experience.
•How authentication from mobile devices differs from laptops and PCs
•Indicators of potential fraud from smartphones and tablets
•What precise geolocation can tell you about a mobile transaction
•Why global shared intelligence is critical to frictionless protection
“Truly great search is all about turning intentions into actions, lightning fast" says Google in its AdWords blog.
This session is based on my 6 step guide to optimising your search strategy for mobile and tablet to deliver this goal:
1. Start by reviewing search behaviour (50% of mobile interactions start with a search)
2. Deliver geo-location based results (85% of mobile searches have location intent)
3. Make your site SEO friendly
4. Optimise search for high-spending tablet users
5. Bid aggressively on mobile PPC
6. Select mobile ad formats to meet consumer demand
As Mobile device usage and BYOD continue to expand within the Enterprise, there are countless variables that can move the needle from one end of the security spectrum to the other. Cyber threats are becoming more sophisticated and the attack surface extends from the device operating system, applications and the network. What measures should Enterprises take to mitigate the risk?
Attend this webinar to learn more about:
- In depth look at evolving threats on the device/OS, in applications and in the network
- Security measures to mitigate risks and stop data leakage
- Best practices for how organizations can adapt to the new landscape
Mike McCarron, VP of Customer Success, discusses best practices and recommendations for how MobileIron customers have built successful mobile app programs that deliver exceptional end user experiences for employees, and provide IT the controls and structure they need to deliver results.
This webinar establishes the four components of a successful mobile apps program:
Governance - build a solid foundation
Technology - build a platform, not just apps
End-User/BU - invite them in early, often
Operations - the launch is just the beginning
In 2012, IDC research found 68% of smartphones used for global business were owned by employees. This shift in prevalence of employee-owned devices from corporate-issued devices is forcing organizations to consider the ramifications of such ownership on the security of its applications, data and content.
New Year's Resolution: Safeguard Social, Mobile and Cloud
Will you be the savvy organization that says "bring it" to bring your own device (BYOD)? Or the one that forgoes the policies and solutions needed to address broader mobile content control? Join Stephen Drake, Program Vice President for Mobility & Telecom research at IDC, for our first live webinar of the year and learn the steps required to successfully manage and secure your business' mobile ecosystem:
- Key market trends to morph your strategy
- Policies and solutions to overcome challenges
- Success attributes to aim for in 2013
It is no secret, comprehensive mobile application testing is the business-critical last mile on the road to success.
However the testing for multi-platform application presents businesses with a number of serious challenges that can affect product quality, time-to-market, and profitability.
Various mobile test automation approaches have evolved recently - from unit, image, instruments, object based test automation to hybrid.
Join this webinar to get current view and future trends in mobile test automation.
We will talk about:
•Mobile test automation challenges
•Evolution of test automation challenges from unit tests to image based and object comparison methods
•Impetus solution approach for comprehensive mobile testing automation
Learn 10 steps to starting your B2B Mobile Marketing efforts with Jamie Turner, 60 Second Marketer, and Jeanne Hopkins, SmartBear Software CMO, co-authors of “Go Mobile!”. Did you know that 85% of mobile devices will be web-enabled this year? Did you also know that 46% of people in the U.S. own a smartphone? And according to Yahoo!, 20% of their searches will come from a mobile device by the end of the year. It’s no longer a question of whether you should join the mobile channel, but rather how you should use mobile in your B2B marketing programs!Read more >
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches.
In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Very few sectors and market segments are left untouched by the digital/mobile convergence ecosystem. The retail and distribution sectors are among those where new consumer behaviours and consumption patterns extensively using digital and mobile tools and devices are changing the paradigms. Comparing prices on the go, comparing products on the move, shopping on the go, Research Online, Purchase offline (RoPo), Social Local Mobile commerce/SoLoMo possibly including augmented reality and targeted advertisement are forcing to coordinate far better the physical and virtual distribution, retail and delivery channels.
Big data, which is increasingly linked to the use of mobile devices by adding a geographical component to the transactions, is therefore increasingly a strategic resource not only for mobile operators but also to technology giants such as Google or Amazon, retailers, banks and payment services providers.
Policy and regulation play a vital role here, especially in the EU markets where detailed provisions protect consumer privacy and regulate individual consent to process personal data. The new EU Data Protection Regulation foresees limits as to profiling.
Furthermore, according to the 2009 regulatory framework, a specific regime applies for the use of mobile location data. Because big data enables the making of huge amounts of unprecedented connections between consumer information, its reality inevitably challenges the ‘consent’ concept of the EU data protection rules.
Industry / policy solutions to be discussed:
• effective use of big data in the mobile business ecosystem
• linking data and profiling consumers across different platforms (mobile networks, online email and social network accounts, payment services, retailers)
• reconcile mobile big data with the EU data protection framework
• what do the expected new EU data protection laws mean for mobile data processing?
• how to obtain a valid customer ‘consent’ in the big data context?