You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management

 

 

The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.

 

Contents:

 

Managing The mobile Enterprise

 

Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.

  

Microsoft talks up hyper-v

 

Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.

 

Care home operator manages apple estate with absolute

 

Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.

 

 

 

 

Click on the button to download this report.

 

These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

     

    Consumerisation and BYOD Purchasing Intentions Europe 2013

     

    Over 140 IT professionals took part in this exclusive Computer Weekly/TechTarget research into organisations’ BYOD and Consumerisation plans.

     

    Executive summary

     

    • Strategic objectives of organisations
    • Key drivers for BYOD
    • Key security concerns for BYOD
    • Top projects for 2013
    • Top corporate mobile applications
    • Top mobile security, wireless, and hardware vendors
    • Impact of BYOD on IT spending
    • Usage policies for personal devices
    • Support for mobile operating systems in enterprises


    Click on the button to download this report

Find more content like what you just read:

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • Mobility's 2020 vision: From decentralized to cognitive management

    Learn how to secure disparate mobile endpoints in this report, and also illustrated is how to move from a siloed mobile management approach to a more consolidated and cognitive one. See how unified endpoint management (UEM) delivers the device-agnostic mobile approach enterprises need, and more.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • 10 reasons to use virtualization for information security

    In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.

    Download

  • EMM: Managing the mobile workplace

    This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.

    Download

  • Cloud-based UEM alleviates the heterogeneous endpoint headache

    Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.

    Download

  • Mobile risk profile improvements by way procuring new PC hardware

    In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.

    Download

  • Cloud technology and mobility are wasted if not properly secured

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.

    Download

  • 69% of managers expect mobility to significantly change the enterprise. Here's why

    Access this infographic to find out how mobility and BYOD are changing the enterprise as much as the introduction of the Internet did.

    Download

  • 6 security components of mobility management software

    As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.

    Download

  • Workplace redesign, meet people-centric mobility

    Download this resource to receive instruction on redesigning the workplace to deliver secure access to apps, desktops, data and services—from any device and over any network—to allow complete freedom and flexibility in how people choose to work. Learning how to foster a collaborative workforce starts here.

    Download

  • How to ensure the wellbeing of your mobile ecosystem...

    In this eBook, you'll learn how to balance the growing mobility needs of end users and the needs of IT. And, learn how to everything in your mobile ecosystem is interconnected and how to manage performance, security, flexibility connectivity and durability.

    Download

  • What you should know: The mobile-cloud era

    Download this white paper to discover a simple and secure enterprise platform that delivers and manages any app on any device. By integrating identity management, real-time application delivery, and EMM, the platform engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the mobile-cloud era.

    Download

  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • 5 steps to secure desktop virtualization-EMM integration

    Learn how to integrate your app and desktop virtualization into a secure EMM solution—enabling IT to store endpoints in a centralized data center or cloud so they can be easily managed at all times. Read on to empower the workforce with anytime, anywhere access to Windows desktops and apps with 5 instructions for integration.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • 6 strategies for securing mobile workers where most needed

    With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.

    Download

  • Mobility strategy planning: 5 vital questions you need to answer

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

    Download

  • 5 signs indicating mobile app delivery should be on your agenda

    This resource will serve as your guide to preparing for the transformative impact of mobility: in it, you'll assess five signs that indicate it's time to implement mobile app delivery. Read on to discover how to expand your EMM to secure remote access from any device and build your mobile app strategy.

    Download

  • MDM: Transforming your EMM to empower the mobile workforce

    This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.

    Download

  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).

    Download

  • The best practices for mobile app deployment

    This white paper highlights 6 ways to provide enterprise application access on mobile devices. Read on to learn the advantages, disadvantages, and target use cases for virtualizing Windows applications, and more.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

    Download

  • EMM: Only One Ingredient in the Mobile Enablement Stew

    Enterprise mobility management (EMM), it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Access our expert e-book that explains how to construct an effective mobile strategy and where EMM comes into play.

    Download

  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.

    Download

  • Managing mobile devices with better visibility: SJ case study

    This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more.

    Download

  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.

    Download

  • How to manage a mobile phone fleet

    The expectations, working methods and tools used by employees in all organisations have changed as a result of advances in communications technologies.

    Download

  • Mobile unified communication: Empower the mobile workforce

    This e-guide shares case studies that demonstrate how companies in several industries have to embrace mobile unified communications (UC) in order to empower their workforce in the field.

    Download

  • R.I.P. IAM: Welcome EMM for unified device visibility

    This white paper uncovers key considerations for a unified mobile enterprise policy. Read on to discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

    Download

  • Comparing EMM suites: Managing mobile apps, devices, and content

    This exclusive vendor comparison from Gartner offers a look at different EMM suite providers and their key differences and benefits. Discover which platforms are best suited to support and improve mobile device management, mobile app management, mobile identity, mobile content management, and more.

    Download

  • The critical roles MAM and MCM play in mobility success

    If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.

    Download

  • How to measure the benefits of EMM...

    Technology budgets are tight, yet businesses still expect IT to increase their ROI. But end-user computing tools don't always rake in big bucks. Instead the ROI comes from increased productivity and simpler management and maintenance for IT administrators. Discover the ROI businesses can get from these technologies and how to measure it.

    Download

  • Top 5 concerns for the mobile workforce

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

    Download

  • 4 common mobility mistakes your peers are making

    Discover four big mistakes you'll want to avoid to stay out of the mobile initiative doghouse. With proper planning, you can clear away many of the roadblocks to mobility success.

    Download

  • Mobile working in business - the facts.

    The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated.

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download

  • Enabling a mobile workforce, reducing technology complexities: Case study

    By reading this resource, you'll learn how EMM bolsters organizations looking to embrace digital workspaces, and examine how Worldpay reduced IT infrastructure complexities and transformed the way their employees work with an enterprise mobility investment predicated on BYO support and remote flexibility.

    Download

  • Implementing EMM: Strategies predicated on BYOD, remote flexibility

    By reading this resource, you'll learn how EMM bolsters organizations looking to embrace digital desktop workspaces, and examine how one organization reduced IT infrastructure complexities and transformed the way their employees work with an enterprise mobility investment predicated on BYO support and remote flexibility.

    Download

  • Managing mobile devices: How to define the maturity model

    Examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. Discover a maturity path for managing mobile devices in a SAM context.

    Download

  • Research snapshot – BYOD in the UK

    BYOD is fast becoming a normal part of daily business life in the UK, this snapshot survey of 100 UK businesses by Vanson Bourne reveals.

    Download