Solutions to Secure the Mobile Enterprise and Accelerate Innovation to Capture Growth in the Global Mobile Economy
CA Technologies Integrates with Samsung KNOX™ to Secure Android Device Deployments across the Enterprise
To date mobile devices have largely been excluded from the business intelligence world because of their limitations and because of security concerns. That, according to Forrester Research, is about to change and the extension of BI to mobile devices will in due course change the nature of BI, it suggests.
Network access control is an aspect of computer security that has been around much longer than the BYOD phenomenon and all the issues thrown up by having mobile devices accessing corporate IT systems. However BYOD has given NAC a new lease of life, according to research firm Frost & Sullivan.
A couple of weeks ago we talked about how the BYOD phenomenon had moved beyond employers simply accommodating, managing and securing employees’ mobile devices and were starting to look at how these devices, and the functionality they bring, could be exploited to strategic advantage; an idea dubbed ‘holistic mobile engagement’. It seems that, by and large, Australian organisations are yet to reach this level of maturity.
If your image of the average Teleworker is somebody sat in front of a computer at home, think again. Research by the ACMA shows more teleworkers using smartphones than desktop computers, and this does not include workers whose work role takes them out of the office.
We talked a couple of weeks ago about how companies that have surmounted the challenges of managing and securing mobile devices are looking at how they can make mobile technologies core to their operations, what Forrester Research calls “Holistic Enterprise Mobile Engagement”. Now Denis O’Shea, CEO of mobile management company Mobile Mentor, spells out a three-step process that can take a company from mobile chaos to mobile mastery.
You’ve done all the right things to secure your employees’ mobile devices: you’ve implemented mobile device management for basic device security and features such as remote find, lock and wipe; you’ve implemented a mobile policy, but to make mobile devices most useful to your staff they need applications. So how do you do that securely and efficiently?
It should come as no surprise that two of the biggest sponsors for the forthcoming Technology in Government conference and exhibition are specialist providers of mobile device management and security technologies.
Enterprise mobility moving beyond BYOD towards corporate app stores and device independent environments
If you were ever in any doubt about the need for a comprehensive and sophisticated mobile device management and security tool like 3CX Mobile Device Manager, a new report from Juniper Networks should dispel those doubts in an instant. Over the past year, the Juniper Networks Mobile Threat Centre (MTC) detected a 614 percent growth in mobile malware along with increased sophistication of cyber criminals whose attacks are becoming increasingly profit-driven.