Fiberlink is pleased to announce that we have been positioned as a Leader in the 2012 Gartner Magic Quadrant for Mobile Device Management Software.We believe that Gartner Magic Quadrants have become one of the most influential research reports upon which IT buyers use for their evaluations and purchases. Fiberlink was positioned in the Leaders Quadrant based on completeness of vision and ability to execute.
by Christopher Clark, President — Fiberlink
by Maribel Lopez, Principal Analyst, Lopez Research
After the phone hacking scandal was exposed in UK recently, the question on every phone user’s mind is this: Is my phone being hacked? It has been proven once again that a little negligence on the part of the user can make data vulnerable to attacks. Thus, the security of smartphones and other mobile devices should be a priority of all individual users and enterprises.
In the ever-changing world of technology, organizations need to be incredibly flexible to keep up. You have to be careful not to lock yourself into something that could become obsolete or force you to accept constraints that could become problematic. That's what makes the cloud so attractive: your company simply does what it does best, and all the technical considerations are handled by somebody else.
Security practitioners like me shy away from absolutes. That being said, I do not have a problem drawing some comparisons across the leading mobile device platforms, specifically Symbian, BlackBerry, iOS, Windows Mobile 7 and Android.
I had the privilege last week of hosting a webinar with Andrew Borg from Aberdeen Research. In the webinar, Andrew presented findings published in their recently released research report Enterprise Mobility Management 2011: Mobility Becomes Core IT. You can view the webinar here or download the full Aberdeen research report here. As Andrew and I prepared for the webinar early last week we had some animated conversations regarding a few of the more surprising findings from the webinar. I thought I would share one here.
Tablets are the current rage in the enterprise mobility space. Businesses are trying to figure out how to use tablets on offense by deploying them to field-facing personnel and as a platform for new types of mobile applications. The IT team (of course) is trying to figure out how to defend corporate data and networks from these new arrivals.
Mobility has become a top priority for IT and business leaders among organizations of all sizes, driven by the increased pressure to improve productivity across a broadening mobile workforce, the desire to become more operationally efficient, and the need to support the proliferation of smartphones and tablets in the workplace.
I had the pleasure of spending time at the 2011 CTIA Wireless conference in sunny Orlando, FL, last week. It could not have been a better location for someone stationed in the Northeast. While down there, I took part in several analyst briefings, the ShowStoppers event, the MobileTrax Innovators dinner, and business meetings with customers and partners attending the show. If you are a person interested in how your home and car are becoming integrated with the Internet, in software applications and in smartphones…then this was a cool show. You may have also had fun with all the device and accessory companies selling Hello Kitty cases for your new Android device.
android apple blackberry bring-your-own-device bring your own device byod cloud-computing endpoint-management ipad iphone it maas360 mam mdm mobile-device-management mobile-devices mobile-security mobile-workforce mobile device management mobility mobility-as-a-service mobility-management security smartphone tablet