IBM Enterprise Content Management Mobile Application Implementation
An IBM Redpaper publication
Published 12 November 2015, updated 09 May 2016
IBM Form #: REDP-5255-00
Rate and comment
Authors: Servando Varela, Brian Benoit, Matt Brooke-Smith, Ben Davies, Robert Nonnenkamp
IBM® Enterprise Content Management (ECM) software enables the world's top companies to make better decisions, faster. By controlling content, companies can use industry-specific solutions to capture, manage, and share information. Successful organizations understand that business content matters more than ever as mobile, social, and cloud technologies transform their business models.
This IBM Redpaper™ publication introduces the mobile functionality offered in IBM Enterprise Content Management products: IBM Content Navigator, IBM Case manager, and IBM Datacap Mobile.
This paper covers key security considerations for mobile application deployments. Many organizations are concerned about the usage of mobile devices for business use and the risk to enterprise data leakage. Mobile technology and mobile security practices have evolved to provide enterprises with all the tools they need to properly secure and manage mobile deployments. As with any best practices or tools, organizations must adopt and implement them for mobile solutions and mobile security to be effective.
This paper provides the reader with a deeper look into each one of the IBM ECM mobile offerings and a full description of their current capabilities; using an end-to-end sample scenario covers a commercial real estate loan process.
This paper is intended for both executives and technical staffs who are interested in obtaining a quick understanding of the mobile capabilities offered in the IBM Content Management portfolio and the application development functionality.
Related Blog Posts
Table of contents
Chapter 1. IBM Enterprise Content Management and mobile overview
Chapter 2. Securing mobile applications
Chapter 3. ECM Mobile apps architecture and deployment
Chapter 4. Building custom and composite mobile applications
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks