Reduce Business Risk by Deploying EMM Solutions with Conditional Access Capabilities
EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD #mobile users to enroll.
Thoughts on Connected Intelligence and Sustainability
EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD #mobile users to enroll.
To prevent malicious apps from attacking corporate assets, get an EMM solution that disables #mobile app stores while blacklisting and whitelisting apps.
To enforce policies on individual #mobile apps, get an EMM solution with MAM capabilities to prevent data leaking from corporate to personal.
If you don’t have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce #mobile device policies and security.
Send “Bring your own Device” BYOD #mobile employees to the Internet via a separate Wi-Fi network versus giving them direct access to internal servers.
The “Bring your own Device” (BYOD) #mobile phenomenon has moved employees from 1:1 PC computing to 5:1 mobility requiring enhanced infrastructure & cloud workloads.
Create a corporate #mobile center of excellence to create processes, establish governance & develop a matrix of supported devices.
I’m pleased to announce that my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform Your Business” is now available. #mobile
I’m pleased to announce the release of Microsoft’s Enterprise Mobility Management (EMM) solution comprised of Windows Server 2012 R2, System Center Configuration Manager 2012 R2 and Windows Intune. In this article, I’ll walk you through each EMM component and illustrate the respective Microsoft capabilities. Mobile Device Management (MDM) This is the most general type of management … Read more
Learn about the future of Enterprise Mobility from me, Benjamin Robbins: Principal at Palador, Vishy Gopalakrishna: VP at SAP, and Ben Smith: Head of #Mobile Product at Tribal Labs.
Let’s talk about trust. So far, my BYOD guidance has been to give your employees a lot of value without allowing their devices to access your internal corporate network. Frankly, the ability to trust any mobile device inside the firewall is a hard sell for security folks. The closest I’ve ever seen was encrypted Windows Mobile … Read more
By the year 2015, companies will need 300% more Wi-Fi access points to provide the same level of bandwidth, access, and throughput as we have today.
As someone who spends a lot of time talking to CIOs about the Consumerization of IT (CoIT) and mobile, I get asked a lot about BYOD strategies. I also recognize that you’re likely to get a different strategy from every person you ask. To quickly recap how we got here over the last several years, the rise of … Read more