You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management

 

 

The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.

 

Contents:

 

Managing The mobile Enterprise

 

Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.

  

Microsoft talks up hyper-v

 

Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.

 

Care home operator manages apple estate with absolute

 

Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.

 

 

 

 

Click on the button to download this report.

 

These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • Guide to the ABCs of MDM

    When it comes to BYOD, differences in operating systems and hardware can create trouble and cause mobility chaos. And with a myriad of choices in products and platforms, it's easy to see how BYOD becomes problematic especially in regards to security. 

    In this definitive MDM resource you discover the ABCs of Mobile Device Management (MDM) and find out why securely managing mobile devices, apps and docs doesn't have to be hard if you have expert advice on:

    • BYOD self-service
    • Proven practices to handle the influx of unsecured mobile devices
    • Securely sharing documents
    • How Mobility as a Service (MaaS) lowers your TCO
    • And more…including a complimentary 30-day MDM solution trial

     

Find more content like what you just read:

  • Learn how to protect corporate data when users use personal devices for work

    Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • 4 steps to bridging the BYOD compliance gap

    This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Mobile computing transforms education

    This white paper outlines how mobility implemented at all grade levels can transform school districts and higher education organizations into more innovative institutions. Read on and discover the true ROI and benefits of education mobility, and find out how it can help your organization.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • 14 mobile security technologies that are rapidly evolving

    In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.

    Download

  • Free Download: MDM Essentials and Practical Applications

    With the wide range of devices and software, mobile devices put your enterprise's security at risk. By taking a few minutes to complete our survey, you'll receive access to our comprehensive guide, MDM Essentials and Practical Applications, and get expert tips on how to leverage MDM for your enterprise.

    Download

  • How to empower mobile workers without compromising security

    29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.

    Download

  • 4 steps to a mobile-first approach

    Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.

    Download

  • Cloud technology and mobility are wasted if not properly secured

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.

    Download

  • 10 common questions about enterprise mobility

    Looking to develop and strong mobile strategy? With consumer choice now the driving force behind mobile enterprise decisions, CIOs must be prepared. Here are the top 10 questions CIOs commonly ask about enterprise mobility.

    Download

  • 3 steps to a secure mobility strategy

    This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.

    Download

  • Addressing mobile file sharing for the forward thinking enterprise

    In this white paper, you'll learn what you need to do to effectively secure your enterprise data in this world of BYOA movements.

    Download

  • Mobile app management best practices

    In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.

    Download

  • Adopt a strong mobile security strategy to enable greater productivity

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

    Download

  • Android OS and enterprise mobility: What you need to know

    In this infographic, you will learn 10 things IT administrators need to know when deploying Android OS in enterprise workspaces. Read more to discover how you can enhance your mobility with Android-enabled BYOD and more.

    Download

  • Choosing the right BYOD solution: 7 best practices

    As organizations begin to experiment or fully adopt BYOD, the strategy behind enterprise mobility needs to run smoothly today and down the road. Access this white paper now to discover the 7 best practices for choosing the right BYOD solution for your organization.

    Download

  • The mobile OS built for business

    Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.

    Download

  • Competitive analysis of the EMM market

    This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.

    Download

  • BYOD: Managing your enterprise mobility security strategy

    This white paper highlights 3 critical questions to ask yourself when formulating your BYOD strategy, as well as coping with COPE (Corporate-Owned, Personally Enabled) and COBO (Corporate-Owned, Business Only) devices.

    Download

  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • Enterprise mobility 101: Best practices for mobile success

    Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.

    Download

  • 10 commandments for a BYOD policy

    This white paper sets out to help you find that balance with the "10 commandments" of BYOD. Read now for 10 tips to creating a secure, productive, and satisfying mobile workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Which tablet will replace your laptop?

    With built-in Office and a keyboard, Microsoft's Surface tablet is geared toward the enterprise. Now, the Apple iPad Pro stands up to the latest version of Microsoft's device, the Surface Pro 4.

    Download

  • End user computing and EMM: Addressing business mobility needs

    This white paper highlights the mobility services of one EMM provider that continues to raise the bar in business mobility. Get access to 10 steps to researching and identifying best practices criteria for stacking up EMM vendors' services.

    Download

  • Don't just invest in mobility for mobility's sake

    Organisations with a culture of user/employee empowerment tend to enjoy the largest returns on mobilityinvestment, but that's not to say that all the benefits they derive are easy to identify or evaluate. Access this white paper to learn how to test whether investments will result in certain major benefits.

    Download

  • A layered mobility approach: MDM and containerization

    In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.

    Download

  • Understanding the impact of Android mobile device exploits

    In this paper, you will break down the most common types of attacks that impact Android mobile devices.

    Download

  • 10 reasons you "don't" need mobile device management

    Mobile device management (MDM) is a dying trend. Like the frosted tip hairstyles and low-rise jeans of the 90's, smartphones are just another fad that'll be replaced soon enough. Read on for ten reasons why you don't need to bother with this MDM nonsense.

    Download

  • Expert tips for overcoming top mobile challenges

    Using the healthcare industry as an example, this white paper takes a closer look at the new mobile trends that are transforming businesses. Uncover tips for overcoming challenges on the road ahead, including access to data, governance, integration, and more.

    Download

  • MDM: Balancing user experience with management functionality

    In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • Turning mobility into a secure advantage

    Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.

    Download

  • 6 key elements to ensuring mobile security

    Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.

    Download

  • Crafting a mobile policy that employees will actually understand

    This white paper acts as a template to help you build a mobile computing policy that your employees will understand and follow as you implement a BYOD and COPE mobility strategies.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

    Download

  • EMM 101: The guide to mobile success

    Mobility is a staple of success in the current business landscape. In this white paper, you'll explore an extensive guide to EMM success. Don't fall behind in the mobile-first business world.

    Download

  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.

    Download

  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.

    Download

  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).

    Download