You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management

 

 

The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.

 

Contents:

 

Managing The mobile Enterprise

 

Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.

  

Microsoft talks up hyper-v

 

Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.

 

Care home operator manages apple estate with absolute

 

Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.

 

 

 

 

Click on the button to download this report.

 

These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • BYOD -- it's not just another vendor buzzword

    Though considered a vendor buzzword by many, bring your own device (BYOD) is still a critical aspect of the mobility movement that is not going away any time soon. In order to support mobile workers demands to work on their own devices – anytime, anywhere – it’s critical to have a strategy in place for managing all of these devices and maintaining security.

    But how do ensure your corporate data is protected, employee demands are met, and your mobile initiatives are manageable for IT?

    This essential guide breaks down 10 rules to simplify your BYOD approach and help you take full advantage of the business benefits mobility offers, without compromising other aspects of your IT environment.

Find more content like what you just read:

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • EMM: Managing the mobile workplace

    This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.

    Download

  • IoT: How to maximize return and mitigate risks

    This white paper details the challenges presented by IoT, and how your enterprise mobility management (EMM) strategy must adapt. The possibilities of IoT are endless, but all these endpoints need to be managed securely and effectively.

    Download

  • Cloud technology and mobility are wasted if not properly secured

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.

    Download

  • How to prepare your desktop model for mobility

    To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.

    Download

  • 6 security components of mobility management software

    As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.

    Download

  • Empowering mobile IT innovation: EMM strategies

    Watch this webcast to explore how VMware IT is empowering users with IT-build internal apps and tools that have enhanced scalability. Discover how to make it simple for internal teams to rework existing technologies, create access to critical information across all your devices, and more.

    Download

  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

    Download

  • Mobile policy document: Must-have tips for construction

    How do you construct a mobile policy that ensures productivity and protection? This white paper is your guide to building a policy document that users will actually follow. End user confusion and empower your enterprise now.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • 6 strategies for ensuring mobile security

    With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.

    Download

  • Mobility strategy planning: 5 vital questions you need to answer

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

    Download

  • Mobile device management: Everything from A to Z

    While there are native applications that can do the basics of mobile device management (MDM), only a true MDM platform can make your IT's life simpler. Access this white paper to learn the ABC's of mobile device management and discover ways to enable productivity and data protection for the way people work.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • MDM: Transforming your EMM to empower the mobile workforce

    This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.

    Download

  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).

    Download

  • Managing mobile devices with better visibility: SJ case study

    This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • Managing mobile devices, apps, and content: MaaS360 30 day trial

    Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security.

    Download

  • Managing mobile devices, apps, and content: MaaS360 30 day trial

    Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

    Download

  • Overcome the limitations of MDM solutions

    In this white paper, you will discover how to overcome the limitations of current container-based MDM/MAM solutions.

    Download

  • EMM: Only One Ingredient in the Mobile Enablement Stew

    Enterprise mobility management (EMM), it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Access our expert e-book that explains how to construct an effective mobile strategy and where EMM comes into play.

    Download

  • Mobile security strategy: 5 essential elements

    End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.

    Download

  • Mobile security: 10 threats to address today

    Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.

    Download

  • EMM market report: Top vendors

    With a wealth of Enterprise Mobility Management (EMM) vendors out there, how do you choose the right one for your business? This report offers an in-depth view of vendors in the EMM market in the context of BYOD office employee use. Access now and discover evaluations of the leading vendors in this market.

    Download

  • How to manage a mobile phone fleet

    The expectations, working methods and tools used by employees in all organisations have changed as a result of advances in communications technologies.

    Download

  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.

    Download

  • Comparing EMM suites: Managing mobile apps, devices, and content

    This exclusive vendor comparison from Gartner offers a look at different EMM suite providers and their key differences and benefits. Discover which platforms are best suited to support and improve mobile device management, mobile app management, mobile identity, mobile content management, and more.

    Download

  • 10 critical decisions that make or break a mobile strategy

    Based on real-world research input from Fortune 500 companies, and insights from mobility analysts and experts, this guide is designed to help you reimagine your strategy for a new era of mobility.

    Download

  • EMM: Manage an ever expanding bandwidth

    This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

    Download

  • Mobile security: Don't fall prey to these 5 misconceptions

    Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.

    Download

  • Mobile unified communication: Empower the mobile workforce

    This e-guide shares case studies that demonstrate how companies in several industries have to embrace mobile unified communications (UC) in order to empower their workforce in the field.

    Download

  • 3 C's of secure mobility

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

    Download

  • The critical roles MAM and MCM play in mobility success

    If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.

    Download

  • Mobile working in business - the facts.

    The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated.

    Download

  • Top 5 concerns for the mobile workforce

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

    Download

  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.

    Download

  • How to leverage mobile metrics for real-time EMM insights

    This paper explores how to leverage mobile as a service (MaaS) tools to create mobile metrics that generate valuable benchmarking data and insights. Discover how to implement the first analytical tool of its kind to deliver real-time EMM intelligence for enabling secure mobile device and app management.

    Download

  • How Windows 10 can transform the disruptive PC-centric MDM

    This white paper will help you evolve your Windows management from a disruptive PC-centric approach to one that offers maximum flexibility. Discover how to leverage conventional Windows management tools utilized today, and delve into the specific management technologies that W10 requires.

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download