Mobile strategy News
March 22, 2017
Microsoft's acquisition of Xamarin forced a change in strategy within IBM, and that turned out to be a good thing for IBM's Bluemix and Mobile cloud platforms.
February 23, 2017
Consumerisation of mobile technology has had many benefits. It has driven down the prices of devices, improved the user experience to the benefit of non-technical users. Plus, awareness and ...
February 14, 2017
Mobile devices put access to IT right into the hands of people while they are out and about performing their work tasks. For many this is not just about 'being in touch' or getting access to useful ...
January 16, 2017
Citrix XenMobile mobile device management policies, features and mobile apps will soon be available to Microsoft shops as an Intune add-on.
Mobile strategy Get Started
Bring yourself up to speed with our introductory content
"Go big or go home" is a common battle cry for people taking on a new challenge, but when it comes to enterprise mobility, some organizations just have to go small. Small and medium-size businesses don't have the capital to buy expensive mobility services, hire in-demand developers or recover from major security breaches. Fortunately, there are some products out there that can help -- and an SMB mobile strategy should focus on security capabilities first and foremost.
Meanwhile, many larger companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. In his column this month, Eric Klein explores how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets. The next steps are ensuring that mobile application code is secure and threat detection software is in place, which Maribel Lopez tackles in her column. This issue's Device Spotlight takes a look at a 2-in-1 tablet from Huawei as the company gains a foothold in the United States. We also look ahead to a few conferences end-user computing pros should consider attending in the final months of the year.Continue Reading
As enterprises expand their mobile footprint, the security risks to their data multiply: an unattended tablet, unsecured Wi-Fi network or malware from a third-party app is all it takes for data loss or a security breach to occur. Protecting just one of these aspects of mobility isn't enough. To address these vulnerabilities, IT executives are now taking a layered approach to mobile security and management. They protect the app layer, for example, with secure containers and the device layer with mobile device management.
In this SearchCIO handbook, Mary K. Pratt lists the tiers of tools and technologies that are increasingly being incorporated into organizations' mobile security strategies. In our second piece, CTO Niel Nickolaisen talks about how delivering good mobile security involves closely examining the risks before heaping on the rules. In our last piece, Features Writer Jason Sparapani catches up with Gartner's Dionisio Zumerle, who talks about how mobile security involves finding a balance between business and user needs.Continue Reading
When business intelligence meets mobility, it changes the way IT shops operate. This is why mobile BI is becoming a key cog in the enterprise machine. Continue Reading
Evaluate Mobile strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Radiology and medical imaging are being transformed by new, more client-centered and mobile approaches and technologies as healthcare moves outside the hospital. Continue Reading
Vendors keep hammering the mobile HR message, but organizations are slow to buy into the pitch. One major reason is HR's failure to serve the biggest user base: employees. Continue Reading
Businesses and consumers have been exposed to powerful potential that lies in mobile devices. Will companies in the mobile space help put that potential to use in 2017? Continue Reading
Manage Mobile strategy
Learn to apply best practices and optimize your operations.
Many companies face obstacles in trying to go mobile, but not every mobile initiative has to be treacherous. IT can take steps to avoid making common strategy mistakes. Continue Reading
Mobile HR capabilities can be a boon to both human resources and to employees, but the key is making sure you approach the rollout in the right way. Here's how to do just that. Continue Reading
The best mobile strategies require careful consideration before IT can implement them. But the right plan can help any organization take advantage of all mobile has to offer. Continue Reading
Problem Solve Mobile strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Developers have traditionally been required to write new checkpointing for individual programs. Professor Gene Cooperman explains how transparent checkpointing will change that. Continue Reading
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks. Continue Reading
CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.
Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.
Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.Continue Reading