You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management



The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.




Managing The mobile Enterprise


Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.


Microsoft talks up hyper-v


Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.


Care home operator manages apple estate with absolute


Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.





Click on the button to download this report.


These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • Guide to the ABCs of MDM

    When it comes to BYOD, differences in operating systems and hardware can create trouble and cause mobility chaos. And with a myriad of choices in products and platforms, it's easy to see how BYOD becomes problematic especially in regards to security. 

    In this definitive MDM resource you discover the ABCs of Mobile Device Management (MDM) and find out why securely managing mobile devices, apps and docs doesn't have to be hard if you have expert advice on:

    • BYOD self-service
    • Proven practices to handle the influx of unsecured mobile devices
    • Securely sharing documents
    • How Mobility as a Service (MaaS) lowers your TCO
    • And more…including a complimentary 30-day MDM solution trial


Find more content like what you just read:

  • Learn how to protect corporate data in BYOD era

    Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.


  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.


  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.


  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.


  • Updating Your Corporate BYOD Program for Success

    This E-Guide from explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.


  • Enterprise mobility management: Maintain security, control

    IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices. Access this expert white paper for essential tips and tricks to mobile management in the modern world.


  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.


  • Is your enterprise mobility strategy soundproof?

    29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.


  • Simply deploy, manage and secure mobile apps

    Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.


  • Balancing mobile benefits with security risks

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.


  • Enterprise mobility: Top 10 questions asked by CIOs

    As consumers become more mobile, they want their work lives to be just as flexible and responsive to their needs. This white paper provides the top ten questions most commonly asked by CIOs about enterprise mobility. Access now to see the answers to these questions that will assist your construction of a mobility strategy.


  • Mobile Threat Management

    Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.


  • A secure, mobile workforce is a happy workforce

    Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.


  • Supplement your MDM with robust security controls

    Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.


  • Mobile app management best practices

    In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.


  • Mobile workloads 101: Increase productivity and prevent data loss

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.


  • Reversing the Shadow IT trend with BYOD

    Discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Dig into the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.


  • 6 security components of mobility management software

    As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.


  • 10 reasons you "don't" need mobile device management

    Mobile device management (MDM) is a dying trend. Smartphones are a fad. Tablets? Simply an unruly smartphone that's too smart for its own good. Who needs them? Read on for ten reasons why you don't need to bother with this MDM nonsense.


  • Android OS and enterprise mobility: What you need to know

    In this infographic, you will learn 10 things IT administrators need to know when deploying Android OS in enterprise workspaces. Read more to discover how you can enhance your mobility with Android-enabled BYOD and more.


  • The mobile OS built for business

    Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.


  • Mobile content management: 10 considerations

    The mobile office is a reality in today's world, meaning a burgeoning number of employees are accessing corporate documents and data on their mobile devices. To protect your business you need enterprise-grade mobile content management. Access this white paper to learn the top 10 considerations for mobile content management.


  • Manage your mobile game like Morris

    Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.


  • Clientless remote software: A key enterprise tool

    Discover how clientless remote software is changing the way two enterprises manage their devices to support end users in a holistic manner. Further, you'll see how security, features sets, and strong relationships underpin these tools.


  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.


  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.


  • Enterprise mobility 101: Best practices for mobile success

    Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.


  • EMM: Expand your mobile enterprise strategy

    In this expert e-guide you will learn how mobility has the potential to completely transform your businesses operations, and why it needs to go beyond EMM to do so. Additionally, discover why it's time to consider an EMM tool strategy in your enterprise.


  • Achieve secure enterprise mobility tailored to any IT budget

    The costs to address the mobility requirements of a forced migration can be significant, but so can the benefits. Discover secure, cost-effective, and robust strategies designed to meet the needs of mobility growth and success.


  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.


  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.


  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.


  • How to manage your BYOD workload from a single screen

    Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.


  • Shifting to a mobile-first mindset before it's too late

    Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.


  • A layered mobility approach: MDM and containerization

    In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.


  • MDM: Balancing user experience with management functionality

    In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.


  • Implementing a safe and secure bring your own device strategy

    This case study explores how Swiss Re implemented a multi-OS enterprise mobility management system, allowing them the security they desired, and employees the freedom to work with their personal devices. Find out how Swiss Re allowed access to the company intranet from any device, developed a "mobile first" strategy, and more.


  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.


  • 5 mobility trends IT needs to know

    Mobile device management (MDM) lets IT enforce security while granting employees the freedom of mobility. Access this trend brief and uncover ways five ways MDM is transforming the enterprise.


  • Mobile decision making: Regain control of enterprise mobility

    This white paper explores the factors that led to the current, complex state of enterprise mobility and examines the Secure Mobile Gateway (SMG) as a solution to regain control of enterprise mobility.


  • Unified mobility management: Simplify TCO

    In response to complexity and TCO challenges, unified mobility has emerged as the next phase of device management. Say goodbye to maintaining parallel support infrastructures for mobile devices and PCs by bringing them under one umbrella.


  • 6 strategies for ensuring mobile security

    With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.


  • Mobility strategy planning: 5 vital questions you need to answer

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.


  • Windows Phone: Mobile device management platform

    If you are using Windows Phone at your business without the proper mobile device management, then you are missing out on the true benefits of workplace mobility. Access this data sheet that highlights one enterprise mobility management platform that provisions, manages and protects Windows Phone devices, apps and documents simply and efficiently.


  • MDM platform makes your life simpler

    While there are native applications that can do the basics of mobile device management (MDM), only a true MDM platform can make your IT's life simpler. Access this white paper to learn the ABC's of mobile device management and discover ways to enable productivity and data protection for the way people work.


  • How to securely enable intranet and internal app mobility

    Discover how you can unlock the potential of your enterprise systems and content. Explore the multifarious benefits of technology that enables simple, safe access to behind-the-firewall resources.


  • EMM: What's driving the evolution?

    How can your organization prepare for the explosive global demand for mobile device usage? By employing enterprise mobility management (EMM). Access this guide that details EMM, EMM deployment best practices, what to look for in an EMM provider and much more.