Yep, it's that time of year again. As people begin removing lights and ornaments from their trees and taking off those goofy Near Years Eve sunglasses, tech pundits across the web are relaying their forecasts and views of what enterprise technology landscape will look like in 2012...
In round one, we broke the two tablets out of their boxes and shared our initial impressions. In round two, our contenders showed us what they were made of as we cross-compared their tech specs. In round three, you learned what it would be like to use each of these tablets at home or the workplace. Now for the round you came to see: IT management capabilities! (if you haven't already, I highly recommend you watch a recording of the event here)
Recently, the MaaS360 MDM solution achieved an important certification under the U.S. Federal Information Security Management Act (FISMA) by the GSA. Google and Salesforce.com are the only other cloud providers who have achieved this certification from the GSA. We've maintained our position as the pioneer in SaaS (software-as-a-service) solutions for secure mobile device and app management. Now that we're a FISMA-certified company, we've become the preferred solution for many Federal agencies.
Do your employees use smartphones at work? Do your employees access business resources from their devices with or without permission? Does your staff use social media services like Facebook, Twitter or LinkedIn to do business or for recruiting talent? If the answer to any of the above questions is Yes, your organization is hit by the “Consumerization of IT” trend.
In the ever-changing world of technology, organizations need to be incredibly flexible to keep up. You have to be careful not to lock yourself into something that could become obsolete or force you to accept constraints that could become problematic. That's what makes the cloud so attractive: your company simply does what it does best, and all the technical considerations are handled by somebody else.
I had the privilege last week of hosting a webinar with Andrew Borg from Aberdeen Research. In the webinar, Andrew presented findings published in their recently released research report Enterprise Mobility Management 2011: Mobility Becomes Core IT. You can view the webinar here or download the full Aberdeen research report here. As Andrew and I prepared for the webinar early last week we had some animated conversations regarding a few of the more surprising findings from the webinar. I thought I would share one here.
Mobility has become a top priority for IT and business leaders among organizations of all sizes, driven by the increased pressure to improve productivity across a broadening mobile workforce, the desire to become more operationally efficient, and the need to support the proliferation of smartphones and tablets in the workplace.
I had the pleasure of spending time at the 2011 CTIA Wireless conference in sunny Orlando, FL, last week. It could not have been a better location for someone stationed in the Northeast. While down there, I took part in several analyst briefings, the ShowStoppers event, the MobileTrax Innovators dinner, and business meetings with customers and partners attending the show. If you are a person interested in how your home and car are becoming integrated with the Internet, in software applications and in smartphones…then this was a cool show. You may have also had fun with all the device and accessory companies selling Hello Kitty cases for your new Android device.
Exchange ActiveSync is great for "push" email synchronization with mobile devices, but as a mobile device management platform it has serious architectural and administrative limitations that leave you exposed to significant security risks. To illustrate the point, let's examine how many company’s enable access to Exchange from mobile devices.
When most people think of industries where mobile device management and security is important, financial services and healthcare immediately come to mind. While the education field is often overlooked, there is a great deal of confidential information on university servers, including financial data, student grades, medical information and much more. In addition to the need for compliance with university privacy policies, higher educational institutions are also required to comply with PCI DSS security standards for electronic payments and sometimes with HIPAA regulations as well.