You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management

 

 

The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.

 

Contents:

 

Managing The mobile Enterprise

 

Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.

  

Microsoft talks up hyper-v

 

Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.

 

Care home operator manages apple estate with absolute

 

Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.

 

 

 

 

Click on the button to download this report.

 

These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • BYOD -- it's not just another vendor buzzword

    Though considered a vendor buzzword by many, bring your own device (BYOD) is still a critical aspect of the mobility movement that is not going away any time soon. In order to support mobile workers demands to work on their own devices – anytime, anywhere – it’s critical to have a strategy in place for managing all of these devices and maintaining security.

    But how do ensure your corporate data is protected, employee demands are met, and your mobile initiatives are manageable for IT?

    This essential guide breaks down 10 rules to simplify your BYOD approach and help you take full advantage of the business benefits mobility offers, without compromising other aspects of your IT environment.

Find more content like what you just read:

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • EMM: Managing the mobile workplace

    This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.

    Download

  • IoT: How to maximize return and mitigate risks

    This white paper details the challenges presented by IoT, and how your enterprise mobility management (EMM) strategy must adapt. The possibilities of IoT are endless, but all these endpoints need to be managed securely and effectively.

    Download

  • Cloud technology and mobility are wasted if not properly secured

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.

    Download

  • How to prepare your desktop model for mobility

    To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.

    Download

  • 6 security components of mobility management software

    As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.

    Download

  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

    Download

  • Mobile policy document: Must-have tips for construction

    How do you construct a mobile policy that ensures productivity and protection? This white paper is your guide to building a policy document that users will actually follow. End user confusion and empower your enterprise now.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • 6 strategies for ensuring mobile security

    With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.

    Download

  • Mobility strategy planning: 5 vital questions you need to answer

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

    Download

  • Mobile device management: Everything from A to Z

    While there are native applications that can do the basics of mobile device management (MDM), only a true MDM platform can make your IT's life simpler. Access this white paper to learn the ABC's of mobile device management and discover ways to enable productivity and data protection for the way people work.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • MDM: Transforming your EMM to empower the mobile workforce

    This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.

    Download

  • Mobile devices: The biggest threat your security

    Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.

    Download

  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).

    Download

  • Managing mobile devices with better visibility: SJ case study

    This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more.

    Download

  • Managing mobile devices, apps, and content: MaaS360 30 day trial

    Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security.

    Download

  • Managing mobile devices, apps, and content: MaaS360 30 day trial

    Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

    Download

  • Overcome the limitations of MDM solutions

    In this white paper, you will discover how to overcome the limitations of current container-based MDM/MAM solutions.

    Download

  • EMM: Only One Ingredient in the Mobile Enablement Stew

    Enterprise mobility management (EMM), it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Access our expert e-book that explains how to construct an effective mobile strategy and where EMM comes into play.

    Download

  • Mobile security: 10 threats to address today

    Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.

    Download

  • How to manage a mobile phone fleet

    The expectations, working methods and tools used by employees in all organisations have changed as a result of advances in communications technologies.

    Download

  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.

    Download

  • 10 critical decisions that make or break a mobile strategy

    Based on real-world research input from Fortune 500 companies, and insights from mobility analysts and experts, this guide is designed to help you reimagine your strategy for a new era of mobility.

    Download

  • EMM: Manage an ever expanding bandwidth

    This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

    Download

  • Mobile security: Don't fall prey to these 5 misconceptions

    Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.

    Download

  • 3 C's of secure mobility

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

    Download

  • The critical roles MAM and MCM play in mobility success

    If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.

    Download

  • Mobile working in business - the facts.

    The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated.

    Download

  • Top 5 concerns for the mobile workforce

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

    Download

  • How to leverage mobile metrics for real-time EMM insights

    This paper explores how to leverage mobile as a service (MaaS) tools to create mobile metrics that generate valuable benchmarking data and insights. Discover how to implement the first analytical tool of its kind to deliver real-time EMM intelligence for enabling secure mobile device and app management.

    Download

  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download

  • 4 common mobility mistakes your peers are making

    Discover four big mistakes you'll want to avoid to stay out of the mobile initiative doghouse. With proper planning, you can clear away many of the roadblocks to mobility success.

    Download

  • How mobile management systems can save your company thousands

    The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.

    Download

  • Critical considerations when comparing UEM tool

    This white paper is your starting point for choosing a UEM solution. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision.

    Download

  • Cloud-based mobile mgmt: How TFP unlocked access to apps and data

    Explore how The Fundraising People replaced their legacy mobility management with a more comprehensive cloud-based platform that increases employees' access to apps and data without sacrificing security. Discover how they unlocked greater control and visibility of mobile devices, all while increasing staff productivity and enabling faster logins.

    Download

  • BYOD program: Secure remote access for end users

    A BYOD program can lower costs and improve productivity.But how do you ensure your BYOD program can meet IT security guidelines and allow workers remote access for secure end user computing?View this video that discusses one easy-to-install platform that gives your employees secure mobile access to all your virtual applications anytime, anywhere.

    Download