You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management



The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.




Managing The mobile Enterprise


Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.


Microsoft talks up hyper-v


Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.


Care home operator manages apple estate with absolute


Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.





Click on the button to download this report.


These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • BYOD vs. COPE: Which is best for your company?

    As the initial excitement about the bring your own device trend dies down, alternate approaches to mobility are emerging. The corporate-owned, personally enabled (COPE) model aims to give more control without curbing users’ activities on smartphones and tablets. We explain the pros and cons of BYOD and COPE to help readers decide which model is the best fit.

    In association with HP and Intel®

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries



  • How mobility raises the stakes of endpoint data protection

    For several decades, computing has become increasingly mobile. As notebooks became both more powerful and more affordable, organizations increasingly outfitted their workforces with portable computers. Not only was the technology advancing rapidly, but mobility-based work processes also demanded the ability to work anywhere, at any time.

    But as first-generation mobile computing gave way to the BYOD phenomenon, new challenges emerged. Those challenges are highlighted in a research survey conducted with the TechTarget network of IT professionals in January 2015: While the survey results certainly support the growing trend toward mobility in general and BYOD in particular, it also highlights some potentially troubling byproducts of that movement. Read on to learn more.

Find more content like what you just read:

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.


  • APIs: Enabler or mobile security hurdle?

    This white paper explains the top 4 challenges of integrating corporate data with mobile applications for remote users. Click now to unveil a solution that acts as a mobile gateway and ensures data adaptation, performance optimization, security, and improved management for mobile developers.


  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.


  • Secure financial MDM in the cloud with end-to-end management

    This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.


  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.


  • Updating Your Corporate BYOD Program for Success

    This E-Guide from explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.


  • 30 minutes to crafting a mobile security strategy

    In this podcast, you'll gain a comprehensive understanding of mobility management in organizations today. Listen in and learn how to secure mobile devices and enterprise data in 30 minutes or less.


  • Debunking the 3 BYOD security myths

    This brief white paper presents the 3 key myths that are holding enterprise mobility strategies back and explains how to move beyond them.


  • EFSS balances productivity and security on mobile devices

    This white paper describes what users look for in an EFSS solution, including the top five corporate EFSS security requirements. Read on to learn about a solution that enables organizations to keep employees productive while meeting IT security and compliance requirements.


  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.


  • Cloud and BYOD: So Happy Together

    Getting cloud computing and mobile computing to coexist in ways that allow workers to be safely productive while not at their desks is a challenge. To succeed, IT admins must contend with device management, content management, file sharing in the cloud and security.


  • Content management: The key to mobile security

    Access this white paper to learn the 7 key features to look for when evaluating a comprehensive access, sync and share solution as you empower your mobile employees.


  • Containerization: The answer to mobile data security prayers

    This podcast explores containerization and how to enable employees to use mobile devices to their full potential without risking data security.


  • Mobile security saviors: The power of SSO and 2FA

    This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.


  • Empowering users with workforce mobility

    Join two experts in the field of endpoint and mobility management as they explore details on how to manage mobile devices in organizational settings. Access this webinar and you'll also find a demo on enterprise mobility management systems.


  • Why hackers love mobile device applications

    In this brief webcast, you will learn how to detect, analyze, and prevent mobile threats against the enterprise.


  • Enterprise mobility 101: Security and device management

    Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, applications and data. Mobile device management must account for who owns what and how it will be monitored and secured.


  • Securing your mobile enterprise: Creating a secure environment

    This white paper presents the 4 essential components that provide complete security coverage for mobile workspaces.


  • The truth about iOS8 encrpytion

    In this podcast, cryptography and encryption expert Rick Robinson gets underneath the technology and explores what's different, how it works, and what the implications are. Listen in to find out if the new forms of encryption are good or bad for enterprise data.


  • Enabling a hyper-connected workplace

    This resource highlights a mobile-first approach to IT infrastructure. Inside, you'll find a checklist that will help you determine what you need in order to give employees access to powerful apps on any device.


  • Competitive analysis of the EMM market

    This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.


  • Game of phones: Which EMM device rules them all?

    This webcast shows how the top EMM operating system contenders stack up: iOS, Android, and Windows. Click here to see which OS overcomes its competitors in the battle for EMM supremacy.


  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.


  • The mobile appdev concerns you need to address

    This helpful guide explains why an app-first mentality can cause IT teams to lose sight of the importance of the mobile infrastructure needed to support app delivery. Learn why it's critical to stay ahead of mobile governance, MDM, and MAM challenges today so that your employees can experience high-quality apps and increased productivity tomorrow.


  • Enterprise mobility 101: Best practices for mobile success

    Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.


  • Enterprise mobility is just a phase – right?

    This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you? BYOD may be more than just a passing fad.


  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.


  • Best practices for managing BYOD and mobility

    Access this white paper to discover the best practices for dealing with tricky BYOD and mobility challenges.


  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.


  • MDM platform comparison: The big picture on ROI

    This informative white paper discusses the functionalities and protections that an MDM solution should offer. View now to uncover helpful tips and guidance for picking a solution that can empower your mobile workforce, while keeping your data secure.


  • Digital Customer Experience – HP Partners point of view

    This brief video explores how companies can have a longer and more meaningful connection with their customers.


  • 4 steps to enhancing mobility in your organization

    Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.


  • A layered mobility approach: MDM and containerization

    In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.


  • End user computing and EMM: Addressing business mobility needs

    This white paper highlights the mobility services of one EMM provider that continues to raise the bar in business mobility. Get access to 10 steps to researching and identifying best practices criteria for stacking up EMM vendors' services.


  • 7 Must-Haves for a Productive Mobile Environment

    Access this white paper for a checklist of the 7 essential steps you must take to create a productive mobile environment for your enterprise.


  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.


  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.


  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.


  • Is two factor authentication the mobile security hero?

    This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.


  • Cloud computing and MDM for manufacturing: Overcoming the challenges

    This white paper surveys the use of mobile device management (MDM) in the manufacturing industry. Read on to learn how you can leverage MDM to improve operational efficiency and bottom-line benefits.


  • Creating and sustaining your mobility policy

    This guide can help you create effective and implement successful mobility strategies for your enterprise. Read it now for in-depth advice on how you can create a mobility policy that will increase productivity, efficiency, and cooperation in your workplace.


  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  


  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.


  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.


  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).


  • Enterprise mobility 101: The Big Bang Theory

    This exclusive white paper takes and in-depth look at how enterprise mobility is expanding, and why device management will become key for organizations. Read on to learn more.


  • The benefits of mobility without the risks

    In this white paper, find tips and tricks for mobile security and mobile management planning.