You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management

 

 

The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.

 

Contents:

 

Managing The mobile Enterprise

 

Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.

  

Microsoft talks up hyper-v

 

Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.

 

Care home operator manages apple estate with absolute

 

Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.

 

 

 

 

Click on the button to download this report.

 

These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

     

    Consumerisation and BYOD Purchasing Intentions Europe 2013

     

    Over 140 IT professionals took part in this exclusive Computer Weekly/TechTarget research into organisations’ BYOD and Consumerisation plans.

     

    Executive summary

     

    • Strategic objectives of organisations
    • Key drivers for BYOD
    • Key security concerns for BYOD
    • Top projects for 2013
    • Top corporate mobile applications
    • Top mobile security, wireless, and hardware vendors
    • Impact of BYOD on IT spending
    • Usage policies for personal devices
    • Support for mobile operating systems in enterprises


    Click on the button to download this report

Find more content like what you just read:

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Mobility's 2020 vision: From decentralized to cognitive management

    Learn how to secure disparate mobile endpoints in this report, and also illustrated is how to move from a siloed mobile management approach to a more consolidated and cognitive one. See how unified endpoint management (UEM) delivers the device-agnostic mobile approach enterprises need, and more.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • Cloud-based UEM alleviates the heterogeneous endpoint headache

    Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.

    Download

  • Workplace redesign, meet people-centric mobility

    Download this resource to receive instruction on redesigning the workplace to deliver secure access to apps, desktops, data and services—from any device and over any network—to allow complete freedom and flexibility in how people choose to work. Learning how to foster a collaborative workforce starts here.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • How to ensure the wellbeing of your mobile ecosystem...

    In this eBook, you'll learn how to balance the growing mobility needs of end users and the needs of IT. And, learn how to everything in your mobile ecosystem is interconnected and how to manage performance, security, flexibility connectivity and durability.

    Download

  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • Mobile app security: Mitigate the threat to your organization

    Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps.

    Download

  • 5 steps: Integrate virtual desktops and apps into a secure EMM platform

    Learn how to integrate your app and desktop virtualization into a secure EMM solution—enabling IT to store endpoints in a centralized data center or cloud so they can be easily managed at all times. Read on to empower the workforce with anytime, anywhere access to Windows desktops and apps with 5 instructions for integration.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • 5 benefits of mobile workspace delivery

    Download this white paper to discover how mobile workspaces can benefit your organization and employees alike, and how EMM can be easily integrated into your existing virtualization platform.

    Download

  • How to tackle the 3 biggest barriers to mobility

    29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

    Download

  • Mobility strategy planning: 5 vital questions you need to answer

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

    Download

  • Securely access apps, desktops, data from any device with this EMM platform...

    Download this white paper to discover the workspace platform that can mobilize your employees and allow users easy and secure access to apps, desktops, data and services from any device, over any network. And find out the key questions you should be asking to guide your organization's move beyond virtualization towards mobility.

    Download

  • 5 signs indicating mobile app delivery should be on your agenda

    This resource will serve as your guide to preparing for the transformative impact of mobility: in it, you'll assess five signs that indicate it's time to implement mobile app delivery. Read on to discover how to expand your EMM to secure remote access from any device and build your mobile app strategy.

    Download

  • The best practices for mobile app deployment

    This white paper highlights 6 ways to provide enterprise application access on mobile devices. Read on to learn the advantages, disadvantages, and target use cases for virtualizing Windows applications, and more.

    Download

  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).

    Download

  • MDM: Transforming your EMM to empower the mobile workforce

    This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.

    Download

  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.

    Download

  • How to: Securely access business apps and data on BYO devices

    Discover how to give your employees secure mobile access to all your virtual applications anytime, anywhere, and meet IT security guidelines that allow workers remote access for secure end user computing.

    Download

  • Unified platform eases mobile device management: Customer success story

    This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more.

    Download

  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.

    Download

  • How to manage a mobile phone fleet

    The expectations, working methods and tools used by employees in all organisations have changed as a result of advances in communications technologies.

    Download

  • Mobile working in business - the facts.

    The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated.

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download

  • Enabling a mobile workforce, reducing technology complexities: Case study

    By reading this resource, you'll learn how EMM bolsters organizations looking to embrace digital workspaces, and examine how Worldpay reduced IT infrastructure complexities and transformed the way their employees work with an enterprise mobility investment predicated on BYO support and remote flexibility.

    Download

  • Reducing infrastructure complexities and embracing mobile workstyles: Case study

    Download this case study to see how one company was able to consolidate technologies to enable a more mobile way of working, and enhance employee productivity.

    Download

  • Implementing EMM: Strategies predicated on BYOD, remote flexibility

    By reading this resource, you'll learn how EMM bolsters organizations looking to embrace digital desktop workspaces, and examine how one organization reduced IT infrastructure complexities and transformed the way their employees work with an enterprise mobility investment predicated on BYO support and remote flexibility.

    Download

  • Mobile unified communication: Empower the mobile workforce

    This e-guide shares case studies that demonstrate how companies in several industries have to embrace mobile unified communications (UC) in order to empower their workforce in the field.

    Download

  • 91% of end-users use smartphones or tablets at work; here's your next step

    This report looks at the challenges that businesses face in taking the next step in their mobile initiatives, how new technologies are changing many areas of business, and how leading organizations are embracing next-generation mobile technology.

    Download

  • Mobility around the world: How do your priorities compare?

    Access this IDC report on mobile resource strategy planning to learn how your peers are approaching their strategies and where mobility lands on their list of priorities. You will also gain a global perspective by seeing how attitudes differ between developing and developed countries and how this impacts attitudes toward key technologies.

    Download

  • Workspace as a Service vs. traditional app deployment

    Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments.

    Download

  • How to: Secure virtual app access for your mobile workforce

    Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.

    Download

  • Research snapshot – BYOD in the UK

    BYOD is fast becoming a normal part of daily business life in the UK, this snapshot survey of 100 UK businesses by Vanson Bourne reveals.

    Download

  • Managing mobile devices: How to define the maturity model

    Examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. Discover a maturity path for managing mobile devices in a SAM context.

    Download

  • How to ensure mobile security without compromising flexibility

    Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.

    Download

  • Mobile Expense Management

    Analysts Rob Bamforth and Clive Longbottom advise businesses on ways to manage the cost of mobile communications.

    Download

  • How digital workspaces can enhance employee productivity...

    Access this resource to learn about the key components of successful workforce transformation as realized through mobile and desktop device cycle support. If you continue on, highlighted is the relationship between improving employee experience and improving customer experience, with special attention on the APJ region.

    Download

  • 4 major threats to mobile security

    Learn about 4 top malware threats to mobile security, how they work, what impact they could have on your business if you're infected, and how to detect and mitigate each strain.

    Download

  • How to Eliminate Top Mobile Security Threats

    With employees bringing an increasing number of unsecure personal devices into the workplace each day, implementing proactive mobile security measures should be a top priority for every IT department. Fill out our brief Mobile Security Checklist to access our guide on minimizing mobile data security threats.

    Download