You've requested...

Share this with your colleagues:

Podcast: The challenges of managing mobile devices across a corporate IT environment

If a new window did not open, click here to view this asset.

Download this next:

CW Buyers Guide: Mobile Device Management

 

 

The widespread use of mobile devices in the corporate environment has brought both benefits and risks. In this nine-page buyer’s guide to mobile device management, or MDM, Computer Weekly looks at the various types of mobile enterprise management tools that have sprung up to address the challenge of managing mobility, focusing specifically on device and data security.

 

Contents:

 

Managing The mobile Enterprise

 

Mobile working has brought new challenges for it, but the fundamentals of managing them remain the same.

  

Microsoft talks up hyper-v

 

Software giant hopes to convince enterprises that its platform and tools offer the reliability needed for MDM in a changing landscape.

 

Care home operator manages apple estate with absolute

 

Software firm offers the right MDM solutions for LNT group to manage a fleet of iPhones without need for individual iTunes accounts.

 

 

 

 

Click on the button to download this report.

 

These are also closely related to: "Podcast: The challenges of managing mobile devices across a corporate IT environment"

  • Igniting Growth in Consumer Technology

    Heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market are stymieing the consumer electronics industry and will continue to do so over the next year, this report from Accenture reveals.

    The Igniting Growth in Consumer Technology survey finds that for nearly half (47%) of respondents, security concerns and privacy risks rank among the top three barriers to buying an IoT device and service. IoT devices include smartwatches, wearable fitness monitors and smart home thermostats.

    The survey also highlights sluggish demand for traditional consumer technology devices. For example, less than half (48%) of respondents said they intend to buy a smartphone this year, down 6% from the 54% who said they planned to buy one in 2015. 

    Only 13% of respondents, for example, said they plan to purchase a smartwatch in the next year, up only 1% from 2015.

    The survey found similar stagnation in demand for a range of devices, including fitness monitors, wearable health devices, smart thermostats and connected home-surveillance cameras – with each only cited as a planned purchase by 9% of respondents, around the same percentage as 2015. 

  • Guide to the ABCs of MDM

    When it comes to BYOD, differences in operating systems and hardware can create trouble and cause mobility chaos. And with a myriad of choices in products and platforms, it's easy to see how BYOD becomes problematic especially in regards to security. 

    In this definitive MDM resource you discover the ABCs of Mobile Device Management (MDM) and find out why securely managing mobile devices, apps and docs doesn't have to be hard if you have expert advice on:

    • BYOD self-service
    • Proven practices to handle the influx of unsecured mobile devices
    • Securely sharing documents
    • How Mobility as a Service (MaaS) lowers your TCO
    • And more…including a complimentary 30-day MDM solution trial

     

Find more content like what you just read:

  • Learn how to protect corporate data in BYOD era

    Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • Enterprise mobility management: Maintain security, control

    IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices. Access this expert white paper for essential tips and tricks to mobile management in the modern world.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • Should BYOD be limited or banned in your organization?

    Bring your own device (BYOD) may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.

    Download

  • Free Download: MDM Essentials and Practical Applications

    With the wide range of devices and software, mobile devices put your enterprise's security at risk. By taking a few minutes to complete our survey, you'll receive access to our comprehensive guide, MDM Essentials and Practical Applications, and get expert tips on how to leverage MDM for your enterprise.

    Download

  • How to empower mobile workers without compromising security

    29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.

    Download

  • Simply deploy, manage and secure mobile apps

    Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.

    Download

  • 4 steps to a mobile-first approach

    Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.

    Download

  • Cloud technology and mobility are wasted if not properly secured

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.

    Download

  • 10 common questions about enterprise mobility

    Looking to develop and strong mobile strategy? With consumer choice now the driving force behind mobile enterprise decisions, CIOs must be prepared. Here are the top 10 questions CIOs commonly ask about enterprise mobility.

    Download

  • Mobile Threat Management

    Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.

    Download

  • A secure, mobile workforce is a happy workforce

    Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.

    Download

  • Mobile app management best practices

    In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.

    Download

  • Mobile workloads 101: Increase productivity and prevent data loss

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

    Download

  • 6 components of mobility management software

    As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.

    Download

  • Reversing the Shadow IT trend with BYOD

    Discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Dig into the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.

    Download

  • Mobility stakes are raised for the financial services industry

    The financial services industry has found that mobility is the big stake feature that will propel organizations forward or leave them in the dust. Read on to learn about a mobile service designed with the cost and security concerns of the finance industry in mind.

    Download

  • Adopt a strong mobile security strategy to enable greater productivity

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices that are critical to employee productivity and smooth business operations.

    Download

  • Choosing the right BYOD solution: 7 best practices

    As organizations begin to experiment or fully adopt BYOD, the strategy behind enterprise mobility needs to run smoothly today and down the road. Access this white paper now to discover the 7 best practices for choosing the right BYOD solution for your organization.

    Download

  • Case Study: Mobilizing a global workforce

    An industry leading company needed to increase mobile productivity for employees spread across the world. Read this case study to learn about an EMM solution allowed this company to achieve increased productivity on a global scale for more than 87,000 employees.

    Download

  • Going mobile without sacrificing security

    As mobile devices become more prevalent in the workplace, ensuring security for these devices becomes a necessity. Uncover a case study about Nemours, a healthcare provider, which gave its employees secure mobility with a single solution.

    Download

  • Enterprise mobility best practices

    Explore 4 case studies that discuss a range of approaches to enterprise mobility. Access now to gain insight on the trends of enterprise mobility deployments, and how to overcome common challenges.

    Download

  • Case study: Multi-OS BYOD solution in major airport

    Read this case study to learn about how Brussels Airport was able to implement a multi-OS BYOD solution to serve everyone that passes through.

    Download

  • Mobile Security Strategies

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

    Download

  • BYOD: Managing your enterprise mobility security strategy

    This white paper highlights 3 critical questions to ask yourself when formulating your BYOD strategy, as well as coping with COPE (Corporate-Owned, Personally Enabled) and COBO (Corporate-Owned, Business Only) devices.

    Download

  • Enterprise mobility 101: Best practices for mobile success

    Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • Empowering applications on any device with full security

    As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.

    Download

  • 10 reasons you "don't" need mobile device management

    Mobile device management (MDM) is a dying trend. Like the frosted tip hairstyles and low-rise jeans of the 90's, smartphones are just another fad that'll be replaced soon enough. Read on for ten reasons why you don't need to bother with this MDM nonsense.

    Download

  • Expert tips for overcoming top mobile challenges

    Using the healthcare industry as an example, this white paper takes a closer look at the new mobile trends that are transforming businesses. Uncover tips for overcoming challenges on the road ahead, including access to data, governance, integration, and more.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • 6 key elements to ensuring mobile security

    Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.

    Download

  • Crafting a mobile policy that employees will actually understand

    This white paper acts as a template to help you build a mobile computing policy that your employees will understand and follow as you implement a BYOD and COPE mobility strategies.

    Download

  • How to manage your BYOD workload from a single screen

    Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.

    Download

  • The 4 methods to secure mobilization

    Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

    Download

  • How St. Joseph Health is embracing mobile transformation

    As mobile devices become more widely adopted throughout the healthcare industry, one healthcare provider's audit revealed a need for better security. Read this case study to learn why St. Joseph Health needed a better enterprise mobility management solution and how they made their decision.

    Download

  • Balancing the Mobile Data Load

    The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.

    Download

  • CW buyer's guide: mobile device management

    The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM).

    Download

  • Smartphone market set to expand as vendors vie for position

    The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market.

    Download