Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.


Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Click here to hide

MaaS360 by Fiberlink

Mobility Management

How mobility has impacted enterprise IT and leadership

By investing in enterprise mobility management solutions and training leaders in BYOD best practices, enterprises can ensure their approach to mobility is successful.

by Rob Patey | 10 Dec 2013

Surviving BlackBerry’s Spiral – A Mobile Continuance Plan

As BlackBerry sinks farther into a downward spiral, careful planning, configuring, testing and reviewing is needed to migrate your organization off BlackBerry devices and help bolster your organization's overall BYOD program.

by Kevin Olivieri | 28 Oct 2013

How will you approach mobile application management?

Although just as important as MDM, mobile application management (MAM) has been incorporated by too few companies. We break down the best practices to get started.

by Rob Patey | 16 Oct 2013

Balance Buoys BYOD Strategies & Adoption

As more companies start to charter the waters of Bring your Own Device (BYOD), the clearest beacon past the rocks seems to be balance between user-friendliness, privacy and corporate security.

by Rob Patey | 22 Aug 2013

7 Rules for Practicing Safe BYOD in 2013

Though the Bring Your Own Device (BYOD) trend has started receiving the green light from enterprise IT, it has been reactionary versus a planned approach with clear insight into the potential and perils.

by Pragati Chaplot Jain | 08 Aug 2013

BYOD Still Risky Business for Enterprises

In a recent survey sponsored by Harris Interactive and Fiberlink, over 2,000 working US adults were asked if they use their personal smartphones and tablets for work activities. Not surprising was that 51% said yes. What was surprising and frankly disconcerting for IT and their information security cohorts, is that many of these workers are treating company data as recklessly as they would a soccer schedule or recipes.

by Rob Patey | 17 Jul 2013

BYOD Success Starts With Preparation!

Enterprise mobility management suites can help companies better mitigate the risks of BYOD and monitor use to drive productivity. These solutions, however, need to be implemented in conjunction with strong information governance policies.

by Rob Patey | 11 Jul 2013

Unwrapping BYOD: Facts & Fiction

A recent CRN slideshow made clear that standalone Mobile Device Management (MDM) solutions are not the one-stop shop for BYOD resolutions. There are several good tips in this article, but there are also some grave misnomers ranging from privacy intrusion to the most popular threats facing enterprise mobility. I would like to take a minute to separate these mobile fictions from the true mobile facts.

by Pragati Chaplot Jain | 26 Jun 2013

UK! BYOD is Coming! BYOD is Coming!

With the impending mass release of 4G in the UK, businesses can expect the same promises in productivity as their American counterparts as IT administrators must start strategizing on mitigating the perils.

by Rob Patey | 05 Jun 2013

Google Glass – Spare the Hate and Spoil the Promise

Sure Google Glass has some problems in functionality and design, but that’s today. Instead of simply writing off this technology I would like to play an optimistic game of “what if” to imagine what Google Glass could be.

by Rob Patey | 21 May 2013

1 2 3 4 5 6 13

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

Free Webinars

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    Half of employers will require their employees to use personal devices for work by 2017 bit.ly/1ozYCwQ
  • MaaS360 MaaS360 by IBM
    In Case You Missed It: Mobility News from the week of August 25th ? 29th bit.ly/1pDIws8
  • MaaS360 MaaS360 by IBM
    Two researchers have discovered a flaw in #Android devices that allows applications to be hijacked. bit.ly/1tquLi9

Most Active Users

Joe Pappano
Donna Lima
Kumar A
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.