As more companies start to charter the waters of Bring your Own Device (BYOD), the clearest beacon past the rocks seems to be balance between user-friendliness, privacy and corporate security.
Passcodes serve as the “lowest hanging fruit” of mobile security for enterprises, yet recent data from Fiberlink’s MaaS360 platform uncovers this startling fact: 15% of organizations still don’t enforce this most basic security measure.
Corporate decision-makers need to work with IT departments, as well as all employees, to formulate the most effective bring your own device (BYOD) policies to guide the use of mobile security technology.
Guest article. The following is by Emily, a High School student entering her senior year and learning about Mobile Device Management (MDM) during her summer internship with MaaS360. Emily was asked to highlight how her school is using mobile devices to improve education and how MDM can help.
Though the Bring Your Own Device (BYOD) trend has started receiving the green light from enterprise IT, it has been reactionary versus a planned approach with clear insight into the potential and perils.
By wrapping security protocols around the 4.2.2 Multiple-User functionality, Android just took another step towards being as attractive for the suits and ties set as it is for shorts and sneakers users.
Rural takes on a new definition in the mobile age. Where once cable and wiring were the only roads to network connectivity, today’s intangible infrastructure can connect a farmer on the back forty as easily as a stock broker on 42nd street.
In a recent survey sponsored by Harris Interactive and Fiberlink, over 2,000 working US adults were asked if they use their personal smartphones and tablets for work activities. Not surprising was that 51% said yes. What was surprising and frankly disconcerting for IT and their information security cohorts, is that many of these workers are treating company data as recklessly as they would a soccer schedule or recipes.
Enterprise mobility management suites can help companies better mitigate the risks of BYOD and monitor use to drive productivity. These solutions, however, need to be implemented in conjunction with strong information governance policies.
A recent CRN slideshow made clear that standalone Mobile Device Management (MDM) solutions are not the one-stop shop for BYOD resolutions. There are several good tips in this article, but there are also some grave misnomers ranging from privacy intrusion to the most popular threats facing enterprise mobility. I would like to take a minute to separate these mobile fictions from the true mobile facts.
android apple blackberry bring-your-own-device bring your own device byod cloud-computing enterprise mobility management ipad iphone it maas360 mam mdm mobile-device-management mobile-devices mobile-security mobile-workforce mobile device management mobility mobility-as-a-service mobility-management security smartphone tablet