The Mobile Imperative: Getting Started and Overcoming Obstacles

View All Special Reports

Stay Connected

Facebook LinkedIn Twitter
While most enterprises are increasingly feeling the imperative to "do mobile," many don't know where to begin, and there are many obstacles to success. This special report covers the range of obstacles from development to deployment, issues ranging from tools to management and security, and why bring your own device (BYOD) needs to be approached more broadly with the applications and strategies designed for today's world.

Vice President & Gartner Fellow David Mitchell Smith discusses getting started and overcoming obstacles with implementing mobile strategies.

Gartner Mobile Imperative Research

Access to research documents may vary based on your subscription.
Avoiding Mobile App Development Security Pitfalls

24 May 2013

IT leaders in charge of application development should follow mobile best practices to avoid data leakage from mobile devices and attacks to the corporate infrastructure.

Critical Capabilities for Mobile Device Management Software

23 May 2013

The critical capabilities for MDM take a deep look at the top technologies in MDM for policy compliance, mobile security management, mobile software management, mobile content management, analytics and delivery styles. This is pertinent data for telecom, network and client computing managers.

BYOD, Development, Deployment and Management Challenges Converge

13 November 2013

Complexity due to multiple priorities and a plethora of choices is causing mobile leaders to delay many mobile efforts. This research will help mobile leaders better survey the landscape and project how the complexity issue will unfold.

Gartner's Digital Wallet Solution Segmentation Model

12 March 2013

The battle for control of digital wallet solutions will define success for payment operations of players in the financial services, retail and telco sectors. A clear understanding of consumer needs, user interface, use cases and how to balance convenience with security requirements will be key.

View All Gartner Events