May 27, 2015
In this week's blogs, analysts discuss how WebRTC video conferencing is shaking up traditional views of video conferencing in education, while Genesys announces Skype for Business integration for the call center.
MIM Get Started
Bring yourself up to speed with our introductory content
What is mobile information management and how does it keep your data safe? Get tips on encryption and password creation in this introduction to MIM. Continue Reading
Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. Continue Reading
Evaluate MIM Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.
Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.
Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.
As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.
Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.
Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.
Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.
Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.Continue Reading
Mobile information management and mobile security should be considered top investment priorities, mobility consultant Bob Egan explains. Continue Reading
Learn to apply best practices and optimize your operations.
The BYOD movement marked a major transition in the enterprise. Instead of managing a fixed number of in-office desktops, IT now has to control an unending stream of endpoints while delivering the performance its mobile workforce demands. Continue Reading
In this tip, learn how to prepare and implement a mobile data management policy that protects your organization against compliance violations. Continue Reading
There isn't yet a single easy solution to managing mobile systems, but there are already a number of tested approaches for handling mobile applications and potentially sensitive data. See how they might apply to your enterprise. Continue Reading
Problem Solve MIM Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When remote employees access mobile data, whether in the U.S. or abroad, it can be difficult to restrict that access. But when they travel to blacklisted nations, IT must be especially careful. Continue Reading
As consumer devices are increasingly used to create and transmit corporate data, businesses are forced to rethink mobile information management. Continue Reading
Forget the debate over managing devices, applications or information. The key to successful enterprise mobility management is combining the three. Continue Reading