Skip to main content
May 07, 2013

A Guide to Enterprise App Stores

AlanAs a growing number of employees bring their personal devices to work as part of the bring your own device (BYOD) movement, companies are increasingly creating and distributing mobile apps. These applications are made available through dedicated enterprise app stores, and can help employees do their jobs on the go and improve their productivity. According to Frost & Sullivan, 68% of North American businesses plan to roll out one or more mobile apps through mid-year. Meanwhile, the most popular enterprise mobility apps in use are predominantly focused on driving higher productivity from employees. In a survey of 300 mobile and wireless decision makers in North America, Frost & Sullivan found that 80% of respondents have deployed wireless email while the next most popular categories for mobile apps are access to internal databases (48%), standalone corporate instant messaging (44%), mobile sales force automation (38%), and employee-to-employee social media (37%). Once a company has built an enterprise mobile app, it’s just the first step in the app deployment journey. In order to protect employee and corporate data on mobile devices, companies must ensure that they’re securely managing mobile apps effectively while setting up a structured approach to distribute, update, monitor, and provision apps across the workforce.... Read the rest of the article on Wired Innovation Insights!

Apperian

More from the Blog
Feb 20, 2019

Part 4: App Security Should Be An Integral Part Of Your DevSecOps Process — Not An Afterthought

How Arxan can help streamline and optimize your DevSecOps process One of the most important factors to keep in mind when dep ...
Read more
Feb 13, 2019

Part 3: App Security Should Be An Integral Part Of Your DevSecOps Process — Not An Afterthought

Situations When DevSecOps Won’t Work Though DevSecOps is getting more popular by the day, and has many benefits to an organi ...
Read more
Feb 06, 2019

Part 2: App Security Should Be An Integral Part Of Your DevSecOps Process — Not an Afterthought

How to start implementing a DevSecOps process As you may have read in our
Read more