Video Screencast Help
Managing Mobility
Showing posts tagged with MDM
Showing posts in English
Solange Deschatres | 22 Sep 2014 | 0 comments

Information for this post was provided by Maribel Lopez, Principal and Founder of Lopez Research, which provides market research, visionary keynotes, strategic consulting services and partnership development services.

classroom.jpgEmployers who’ve embraced Bring Your Own Device (BYOD) programs do so anticipating a more nimble workforce; employees being reachable everywhere, collaboration across geographies, and less company-owned hardware to purchase. While employees enjoy the freedom to use their own device, organizations sometimes fail to properly cover all of the necessary staff training that accompanies a BYOD program. Similarly, emails to employees regarding the changes BYOD brings or a buried/confusing policy can be missed, leading employees to fail to...

CherylTang | 15 Sep 2014 | 0 comments

devices.jpgLike it or not, companies are continuing to face a wave of new internet-connected devices hitting their networks. Driven by employee’s desire for newer, sleeker, and faster devices, IT departments are often finding themselves hurrying to develop a Bring-Your-Own-Device (BYOD) programs and mobility policies that’s both secure and appealing to their end users. There’s little doubt that BYOD programs are growing in popularity, Gartner predicts that as many as half of employers will soon require employees use their own device for work purposes. However, the governing policies for these programs are sometimes implemented clumsily, or not at all. Getting these policies right the first time can be extremely important to not only the security of business data and intellectual...

Will Redfield | 24 Apr 2013 | 0 comments

SYM-2013VisionMobileSurvey-infographic-Rev-H-2013-04-24.jpgWhen it comes to mobile, BYOD is definitely here to stay. But, is it worth the risk?

This year at Symantec Vision we wanted to better understand our customers’ perceptions of how personally owned mobile devices are used in their organization.  To do this, we conducted a survey of 236 attendees asking how their company is addressing BYOD, including risks, challenges, polices, usage and management of mobile devices.

What we found is that while most organizations allow employees to use personal mobile devices for business purposes, they also accept that doing so will likely result in a mobile security incident. Survey...

Will Redfield | 06 Dec 2012 | 0 comments

This post first appeared on the website of Mobile Enterprise Magazine.

While it is true that the design of some aspects of mobile device operating systems afford better in-built security against certain types of malware, it is a mistake to assume mobile devices are impenetrable. Believing they are lacks foresight.

In fact, the current state of mobile malware is reminiscent of the early days of computer security as whole. In those early days, many believed that simply practicing “safe surfing” would be a sufficient countermeasure.

...