Mobile Device Management

How To

How to Ensure SAM and SLM Compliance in Mobile Environments

Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well. Full Story »
Feature

How MDM Works -- or Doesn't Work -- For SMBs

In large-scale organizations, implementing mobile device management (MDM) is typically given. After all, with so many employees using mobile devices that either contain or connect to sources of sensitive information, there needs to be some way to keep everything in check. But what about those companies that aren't big enough to be able to afford an MDM implementation and a full-sized IT department to manage it? Without a means to centralize the control of mobile devices, how can these smaller companies protect their data?

Advice & Opinion

Microsoft Gets Strategic with its Enterprise Mobility Suite

With its Enterprise Mobility Suite, Microsoft will make it easier for companies to manage a range of devices, including those running Apple's iOS and Google's Android. It's a smart move, says columnist Ryan Faas.

News analysis

Financial Services Firms See Mobile Boom, But Blackberry and CIO Roles Fade

The financial services industry is on the verge of a mobile explosion. The number of smartphones will double in the next year. However, BlackBerry use is headed in the opposite direction as companies migrate to other mobile platforms. The role of CIOs in mobililty is also fading.

Research

Consumerization of IT in the Enterprise Starting to Pay Off

Businesses are beginning to reap ROI and productivity benefits from consumer technologies such as smartphones and tablets, according to a survey of 1,155 IT decision-makers conducted by IDG Enterprise.

How To

5 Ways to Prevent Data Loss in Mobile Environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.

How To

How to Work Seamlessly Across Multiple Devices

Employees who used to burn the midnight oil at the office now get to do so from the comforts of home, thanks to the proliferation of personal laptops, tablets and smartphones. Getting files to appear on and sync with multiple devices can be challenging, but a little bit of advanced planning can go a long way.

Review

Using Amazon Kindle Fire HDX Tablets in the Enterprise

When you think of business tablets, chances are Amazon's Kindle Fire HDX tablets don't come immediately to mind. Though not perfect, the Kindle Fire HDX tablets are actually well suited for business use, particularly BYOD, according to CIO.com's Al Sacco.

News

IBM's Push for MDM Market Share Swings Into High Gear

Chris Clark, president and COO of mobile device management company Fiberlink, has no doubts about the importance of MDM.

News Feature

How Forensic Tools Unearth Deleted Text Messages

A mobile security guru offers a quick rundown of forensic tools and how they retrieve deleted SMS.

News Feature

CIOs Battle Worker Apathy Towards Lost or Stolen Mobile Phones

American workers don't get too worked up about lost or stolen mobile phones -- even if those phones contain company data. A large percentage think it's not their problem and don't change their security practices afterwards. Are CIOs partly to blame for not setting stricter and clearer mobile security policies?

News

Security Firm Discloses Apple iOS 'Malicious Profile' Vulnerability Impact on MDM

At the RSA Conference today, security start-up Skycure plans to disclose a vulnerability in Apple iOS devices that can impact mobile-device management (MDM) systems running on them.

News Feature

Mobile Device Management Lets You Track Your Teens

It's becoming more common for companies to deploy mobile device management to track smartphone and tablet use as part of a BYOD policy. However, now MDM software is coming home to help parents keep tabs on their teens -- and possibly each other.

News analysis

7 Tech Acronyms and Abbreviations That Need to Go Away

IT is full of shorthand. (Hey, there's one example.) Many abbreviations and acronyms have become standard terms in tech, if not everyday language. But some terms just need to be retired.

How To

7 Enterprise Mobile Security Best Practices

There's no denying the potential for mobile devices to improve efficiencies and lower costs for workers in industries of all types. You also can't deny the potential security vulnerabilities that mobile devices present. These seven tips will help you secure your mobile environment without placing a burden on your workforce.