It's become fashionable in some circles to suggest that Mobile Device Management (MDM) is dead, but nothing could be further from the truth. While MDM is still very much in its infancy, its boundaries continue to expand.
In between two giant technology tradeshows — International CES last week and NRF next — the mobile industry is already moving fast in 2014. Here’s some recent personnel, partnership and security news.
To prove a point (and with permission), this security expert showed how risky mobile POS can be for both the business and the user.
Holistic, strategic, “mobile first”— is this the enterprise mobility version of Nirvana? Maybe. What it’s not, just yet, is reality. Here are some actual initiatives, challenges and trends that reflect a range of maturity across verticals.
No diet, going to the gym or quitting drinking for this analyst, but doing better next year is a priority. What should industry experts, enterprises and solution providers keep in mind for mobile?
Solution is designed to bring greater insight to more people by extending the power of predictive analytics from data scientists to line-of-business users.
In an age where information is everything, most people seem to lack information about IT security. Mobile devices face a growing number of challenges and threats targeting the devices and the organizations they connect to.
The use of employee-owned devices (EODs) within the enterprise has exploded recently. There are numerous aspects that impact an organization when employee-owned devices are allowed into the IT environment. As a result, enterprises need a cohesive plan that addresses each of the key elements of supporting EODs.
What happened this week in enterprise mobility? Security and apps lead the moves.
The risk of data loss and security breaches from mobile computing is substantial, whether it’s lost devices, hackers gaining entry via mobile employees or the steady stream of new threats coming out. This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices.