Stratasys, Ltd

MIM News

  • May 27, 2015 27 May'15

    UC Blogs: WebRTC video conferencing impacting education

    In this week's blogs, analysts discuss how WebRTC video conferencing is shaking up traditional views of video conferencing in education, while Genesys announces Skype for Business integration for the call center.

MIM Get Started

Bring yourself up to speed with our introductory content

Evaluate MIM Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Evaluate the three EMM security options: MDM, MAM and MIM

    There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading

  • Mobile data backup helped by encryption, data policies

    More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.

    Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.

    Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.

    As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.

    Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.

    Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.

    Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.

    Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.

     Continue Reading

  • Prioritizing mobile information management and mobile security

    Mobile information management and mobile security should be considered top investment priorities, mobility consultant Bob Egan explains. Continue Reading

View All Evaluate

Manage MIM

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve MIM Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.