Quantcast
Channel: All stories about Mobility 101 on Enterprise Mobility Today
Browsing latest articles
Browse All 60 View Live

Image may be NSFW.
Clik here to view.

Security Is the Biggest Success Measure For BYOD

Report examines how companies are responding to the security threats presented by the influx of mobile devices on the company network.A recent survey on LinkedIn finds that security is both the top...

View Article



Image may be NSFW.
Clik here to view.

Learn Enterprise Mobile Lessons from LinkedIn

Enterprises can take a lesson from LinkedIn on going "mobile first" while keeping customer experience top of mind.Businesses should learn a lesson from LinkedIn, which is assuming a mobile-first...

View Article

Image may be NSFW.
Clik here to view.

Meet the 4 Major Enterprise Mobility Challenges Head-On

To overcome enterprise mobility challenges, organizations must first identify and face them.We wish we could tell you that mobilizing the enterprise was always easy, but, as with most things worth...

View Article

Image may be NSFW.
Clik here to view.

Despite BYOD Security Worries, SMBs Slow to Deploy MDM

While 61% of small and midsize businesses have implemented a BYOD policy, only 37% are managing or plan to manage those devices using a mobile device management product, according to a survey of almost...

View Article

Image may be NSFW.
Clik here to view.

Top 10 Enterprise Mobility Myths Busted

To move along the enterprise mobility continuum, companies need to know the truth about 10 commonly cited myths.The enterprise mobility industry is at a pivotal time as companies look to gain greater...

View Article


Image may be NSFW.
Clik here to view.

Tablet market booms, but can mobile enterprise apps keep up?

The unprecedented adoption of tablet PCs means the fully mobile enterprise is now possible. But true enterprise mobility also requires access to full ERP functionality on the road, says Taryn Cromie,...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Risks and Rewards of BYOD

Companies are eagerly jumping on the BYOD train, but in many cases they are leaving behind security and management measures.An infographic shows that BYOD is in full force in the enterprise, but that...

View Article

Image may be NSFW.
Clik here to view.

Defining the Enterprise Mobile Acronyms You Need To Know

 Every technology comes with its own set of confusing terms, but mobile seems especially rife with similar-sounding acronyms. BYOD. MDM. MAM. COPE. ... The list of acronyms in the mobile space goes on...

View Article


Image may be NSFW.
Clik here to view.

Windows Phone: Familiarity Breeds Comfort for CIOs

End-to-end Windows might just be the easy way to an in-house app store.Windows Phones may not be setting sales charts afire, but CIOs like the look of them, according to interviews. The appeal of...

View Article


Image may be NSFW.
Clik here to view.

The BYOD Security Threat Is Real--And Growing

Former FCC fraud investigator discusses the threats inherent in the BYOD model and how companies are falling short in protecting against them.In an interview, Paul Luehr, formerly a federal prosecutor...

View Article

Image may be NSFW.
Clik here to view.

Workers' Use of Cloud, Mobile Is Compromising Corporate Data

Corporate data is getting exposed to a growing number of threats as workers increasingly turn to consumer-based storage and devices. More than a third of office workers store company documents on...

View Article

Image may be NSFW.
Clik here to view.

How to Create a Cost-Effective BYOD Policy

BYOD doesn't have to be complicated or expensive, thanks to advances such as desktop virtualization.When it comes to the mobile enterprise, issues related to BYOD are at the forefront. A recent report...

View Article

Image may be NSFW.
Clik here to view.

Google Glass Requires New Kind of Mobile Policy

Wearable devices such as Google Glass could cause a range of tricky situations in the workplace.While most businesses have a BYOD (Bring Your Own Device) policy that covers items like smartphones,...

View Article


Self-service BYOD is a lot easier than it seems

Two new companies, MobileSpaces and Appthority, recently showed off their approach towards bringing a more consumer-like approach to enterprise BYOD.

View Article

Ovum warns BYOD is here to stay as 70% of employees use personal devices to

With corporate BYOD activity by full-time employees (FTEs) remaining steady at almost 60% over the past two years, the global industry analysts warn business leaders to respond and adapt now to this...

View Article


Image may be NSFW.
Clik here to view.

Should Company Help Desks Support BYOD?

Companies must be very clear about what help desks will and won't support when it comes to BYOD.BYOD policies must clearly outline what the help desk supports–and what they don't support. This video...

View Article

Alabama State Agency Adopts BYOD Policy

Many state and local government IT departments are embracing BYOD policies to help cut costs and eliminate expensive smartphone contracts. But while saving money is important in maintaining a healthy...

View Article


Image may be NSFW.
Clik here to view.

Mobile: 10 Ways Organizations Are Vulnerable

Companies are risking costly mobile data breaches by not taking the necessary steps to secure data.Many companies are leaving themselves open to losing sensitive and confidential data because so few...

View Article

Image may be NSFW.
Clik here to view.

How To Balance HIPAA Compliance and BYOD

It's tricky to maintain HIPAA compliance while managing the many devices practitioners are using.Research shows that clinicians use 6.4 different mobile devices in a day on average. Mobile health...

View Article

Image may be NSFW.
Clik here to view.

4 Tips for Developing Enterprise Mobile Strategy

Companies don't need dedicated staff for BYOD--but they do need a few, key strategies.Corporate mobile device strategies used to go something like this: You’ll use what we give you, don’t download...

View Article

Image may be NSFW.
Clik here to view.

How To Balance BYOD and Physical Security

The BYOD trend can open companies up to more risk when it comes to physical security apps.It didn’t take long for the security industry to embrace mobile computing. For example, it is considered basic...

View Article


Image may be NSFW.
Clik here to view.

NIST Provides Best Practices for Securing Mobile Devices

NIST publication makes recommendations for buying and implementing mobile device security.The latest in a series of National Institute of Standards and Technology (NIST) publications is the "Guidelines...

View Article


Image may be NSFW.
Clik here to view.

10 Considerations for Enterprise Mobility Strategy

Smart organizations take a thoughtful, comprehensive approach to development of mobile strategy.Enterprise mobility is complicated. It's not because of the technology, but because everyone thinks he...

View Article

Image may be NSFW.
Clik here to view.

Managing Mobile Requires Knowing Thy Users

Enterprises are utilizing a variety of strategies to effectively gain control of mobile.To effectively manage mobile in the enterprise, you must have knowledge of all the ways employees are using the...

View Article

Image may be NSFW.
Clik here to view.

The 3 Biggest Security Risks of BYOD

BYOD saves on equipment costs, but has the potential to cost companies dearly when it comes to security.Few trends are shaping the workplace like BYOD. And it’s no wonder: Allowing employees to bring...

View Article


Image may be NSFW.
Clik here to view.

The Internet of Things Defined for the Enterprise

"The Internet of everything" focuses on reducing the cost, complexity and time associated with data collection.The original concept of "the Internet of things" was created by a technologist and...

View Article

Image may be NSFW.
Clik here to view.

5 Reasons To Spend More on Enterprise Mobility

There are compelling arguments to be made for increasing your mobility budget.Giving employees access to all their work and personal data—anytime, anywhere and from the device of their choosing—is...

View Article

Image may be NSFW.
Clik here to view.

Does BYOD Mean 'Bring Your Own Disaster' for Feds?

As appealing as bringing personal devices to work may be, the downsides are hard to ignore.Managing mobile devices and their risks, instituting security measures on par with more traditional desktops...

View Article

Image may be NSFW.
Clik here to view.

CIO Proves BYOD and Sensitive Data Can Mix

CIO of non-profit Our Kids program has successfully implemented a BYOD program while protecting PII.Pat Smith, CIO of Our Kids of Miami-Dade and Monroe Inc., has implemented a successful BYOD program...

View Article



Image may be NSFW.
Clik here to view.

Androids Need their Own Enterprise BYOD Policy

Android has more security issues that iOS, which may warrant a dedicated policy effort.Mobile computing experts suggest that companies consider developing multiple BYOD policies--or, at least two: one...

View Article

Image may be NSFW.
Clik here to view.

Malware Is Hopping Along for BYOA Ride

End user training is your best defense against the dark apps.BYOD is a growing concern for enterprise IT managers, but they must now turn their attention to BYOA--or bring your own apps. Users are...

View Article

Image may be NSFW.
Clik here to view.

Mobile Payment Security: An Essential Factor for Mass Adoption

To expand mobile payment adoption, companies must select--and buy into--a security model.Trust in the phone, or trust in the app--one of these two security models is key to mass adoption of mobile...

View Article

Image may be NSFW.
Clik here to view.

How To Strike the Right Enterprise Mobile Balance

There are five factors to consider when seeking to balance enterprise mobile benefit and drawbacks.The use of mobile in the workplace has many benefits, but there are also many hurdles and gotchas. The...

View Article


Image may be NSFW.
Clik here to view.

How Enterprise Mobility Is Changing the Workforce

Mobility is not going away, but companies do have a choice in the matter: Be proactive or reactive.Mobility in the enterprise is not going away. Indeed, it is transforming the workplace. Companies can...

View Article

Image may be NSFW.
Clik here to view.

6 Ways End Users Are Putting Data at Risk

Mobile device use is among the ways that end users are putting your company's data at risk.End users don't mean to put data at risk, but they do so in many different ways, from using cloud-based apps...

View Article

Image may be NSFW.
Clik here to view.

E-Discovery Must Be Covered in BYOD Policy

Your BYOD policy should address requests for electronically stored information.When developing a BYOD policy, it's important to consider e-discovery. In other words, what happens when mobile devices...

View Article


Image may be NSFW.
Clik here to view.

BYOD Makes Oxford English Dictionary--Now What?

"BYOD" is officially in the OED. Does this mean BYOD's time has come or that its time has passed?When new words get added to the Oxford English Dictionary, it's a big deal. It gives the people, places,...

View Article


Image may be NSFW.
Clik here to view.

Mobile Containerization Helps Achieve BYOD Balance

Containerization helps IT departments balance freedom and security when it comes to BYOD.Employees today expect a certain amount of choice and freedom when it comes to mobile devices and apps. And, if...

View Article

New Ultra Rugged Android Takes Enterprise Mobility To New Level

Two Technologies is pleased to announce the introduction of the N4; the first in a series of ultra-rugged Android(TM) devices designed for mobility applications in harsh weather and demanding...

View Article

Image may be NSFW.
Clik here to view.

Pentagon Prepares for a Future Without BlackBerry

The Pentagon and Department of Defense look to future without BlackBerry, as security clearance for iOS and Android nears.

View Article
Browsing latest articles
Browse All 60 View Live




Latest Images