Mobile Device Security Measures What measures are you taking to address the bring your own device (BYOD) trend? Narrowing support down to specific devices may be a tempting approach. Some CIOs are saying "no" all together. As easy as each of these sound, they may be eliminated as options for CIOs moving forward. This assertion comes from a recent report by IDG News Service, highlighting a panel discussion that took place at the MIT Sloan CIO Symposium in Cambridge, Massachusetts. The panel fervently discussed BYOD and affirmed the critical role that mobile device management (MDM) has had in assisting IT and the enterprise as a whole. "IT departments can either support [the BYOD trend] or be a receiver of the fallout," said Rob Stefanic, CIO of Sensata Technology According to Stefanic, Sensata didn't completely understand the consequences of employees connecting to the network with mobile devices when the company adopted a cloud-based platform in 2007. The current goal for IT is to reduce the impact of security breaches without limiting employee access to company data.It can be tough to find a balance between security and freedom, but the first step is knowledge. To discover the essential demands BYOD policies should meet, read The Ten Commandments of BYOD.
Product Marketing Manager
Do you Wi-Fi, or do you data hog? That is the question. Right now, a best practice for staying under your data limit is to maintain awareness of your consumption level. Individuals who stay on top of this usually know where the next-closest Wi-Fi network is. And make a habit of staying connected to it early and often! As per a report from comScore (comparing users of the top two most popular mobile platforms) you're more likely to receive this helpful advise from an iPhone user than you are an Android user. This information spells both good and bad news for IT administrators tasked with managing a diverse mix of smartphones and tablets.
by Christopher Clark, President — Fiberlink
android apple apps bring your own device byod cloud cloud-computing emm enterprise mobility enterprise mobility management ios ipad mam mdm mobile mobile application management mobile app management mobile apps mobile device management mobile security mobility security smartphone tablet wearable technology