If your company has yet to implement a bring-your-own-device (BYOD) policy, it is likely a plan in the works. And why not? For most organizations, the initial draw is reduced spending. With more employees bringing their iPhones, iPads, and Android devices to work there is no rush to acquire new hardware. And then there's the benevolent element; putting a smile on everyone's face. Employees who are bringing their devices are loving work more than ever now that they've severed ties with their desk.
Did you know that around 45% of the mobile workforce has a job that is compatible with a certain amount of mobile commuting? Wow!
Recently, the MaaS360 MDM solution achieved an important certification under the U.S. Federal Information Security Management Act (FISMA) by the GSA. Google and Salesforce.com are the only other cloud providers who have achieved this certification from the GSA. We've maintained our position as the pioneer in SaaS (software-as-a-service) solutions for secure mobile device and app management. Now that we're a FISMA-certified company, we've become the preferred solution for many Federal agencies.
Mobility has become a top priority for IT and business leaders among organizations of all sizes, driven by the increased pressure to improve productivity across a broadening mobile workforce, the desire to become more operationally efficient, and the need to support the proliferation of smartphones and tablets in the workplace.
Exchange ActiveSync is great for "push" email synchronization with mobile devices, but as a mobile device management platform it has serious architectural and administrative limitations that leave you exposed to significant security risks. To illustrate the point, let's examine how many company’s enable access to Exchange from mobile devices.
In the world of computers there is a pretty easy way to tell when a technology has “arrived”: it becomes a target of hackers. You can just look at the recent history of computers, from email to web pages, from DNS to the World Wide Web (remember when we used to call it that?), Microsoft Windows to Wi-Fi—the technologies that become the mainstays of business and consumer markets quickly become targets of hackers.
I recently went to my doctor to investigate something that was troubling me. Believe it or not, several times a minute I feel a short vibration or buzz in my heart area. It has been happening for 3- 4 weeks and, until late last week, I did not realize it was actually my heart. I had dismissed it for weeks thinking it was my breathing, vibrations in the floor of my office, and, yes, my BlackBerry.
Every two weeks the Customer Platform Services team at Fiberlink hosts a webinar on topics of interest to mobile IT professionals. On November 4, we presented a webinar on Enabling Android in the Enterprise. The webinar was meant to provide practical advice to IT practitioners that wanted or needed to take advantage of the new Exchange features supported in Android 2.2 (Froyo) like remote-wipe and password policy enforcement.
In response to Clint’s last blog “Fear the Droid,” sure, his points are valid from an IT perspective, but as user, here’s what I think is great about the Droid.When the Motorola Droid by Verizon was first announced and commercials started to air, I remember thinking (as I am sure thousands of others did), what is this device? What can it do? What does it look like? (They didn’t include photos in the first commercials.) And wait—it’s NOT an iPhone? I didn’t want to jump into it purely because it was the new thing or because of their commercials, but as a fan of Google and their applications I was excited to see them develop a mobile OS and partner with Verizon.
For the third follow-up in my series of Five Ways to Reduce Wireless Spend I d like go into more detail about Developing your Wireless Strategy and Leveraging Tools for Enforcement.