Secure mobile printing leader Breezy today announced that it has joined OpeanPeak’s SECTOR Network. The addition of the leading Android & iOS secure mobile print app allows global service provider EMM solutions to print without sacrificing security.Read More
Everyone in IT knows about BYOD – bring your own (mobile) device. But does your company have a policy and procedure in place to deal with BYOA? Employee use of third-party cloud application services and consumer applications in the workplace is one of the biggest challenges facing IT right now.
According to a recent report from Gartner, this is trend represents such a challenge because more than 75% of mobile apps fail basic security tests. Employees download from app stores and use mobile apps that can access enterprise assets or perform business functions, and many of these apps have little or no security assurances. Well-meaning employees can easily expose themselves to cyberattacks and violations of enterprise security policies.Read More
A Screw’s Loose is one of the more interesting technical blogs out there. Katz, a Director of Mobility Engineering at Sanofi and a widely recognized thought leader in enterprise mobility, wrote a great post recently on the a continuing gap between what users want and what IT delivers – and noted that the cause of that gap is the way IT views the users.
In the post, Katz writes that IT shouldn’t view employees as IT users, but as IT customers. Changing the definition makes a big difference in how products and services are developed, rolled out, and supported. “Whenever people talk about creating apps the conversation turns to delighting the customer. Companies build apps that will delight people. They will have a great user interface (UI) and an even better user experience (UX). They will enable people to do what they want/need to do. We learn from day one when you walk into a company it’s all about pleasing the customer. That’s why we build consumer apps the way that we do,” Katz wrote.Read More
Most of the coverage of the deal between Apple and IBM to bring mobility into the enterprise as part of an overall enterprise solution instead of often unplanned BYOD growth has focused on the idea that the deal marks the official end of the PC era. In the short time since it was announced, hundreds of thousands of words have been devoted to the implications for enterprise IT. So what’s left to say?
How about the fact that with more than 100 industry-specific enterprise solutions written as native apps, and a new kind of enterprise-level support options that will very quickly simplify the adoption of iOS devices in the enterprise. As Paul Mah of Fierce CIO wrote, the new support format is one of the biggest benefits for enterprise IT. “Certainly, it would be more palatable getting on-site support from IBM as opposed to having highly-paid IT staffers standing in the queue to get problems fixed.”Read More
Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.
A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.Read More
Every year, tech venture capital leader Kleiner Perkins Caulfield Byers (KPCB) publishes a report on Internet trends. And every year that report serves as a snapshot that developers, investors and CIOs use to help them plan ahead and check their understanding of important trends.Read More
This week, Gartner released the 2014 Magic Quadrant results in the new Enterprise Mobility Management (EMM) category. In past years, Gartner called this category “MDM”, or mobile device management, and the name change signals Gartner’s view that the category has evolved from a point solution to a more comprehensive platform.
(Last week, we published the first part of a two-part look at how pre-surveys and user audits help IT departments create a framework that will keep a BYOD policy from devolving into a chaotic, unsecured “do your own thing” (DYOT) environment. This is the second part of that article.)
For many IT managers, BYOD (bring your own device) model can devolve into a chaotic DYOT (do your own thing) model, where users actively circumvent IT policies and apps in favor of unmanaged consumer apps, unmanaged personal cloud storage, or even devices that are encrypted to block company oversight and reporting. What could cause that nightmarish scenario?
Whether it’s a school, small business, or large enterprise tablet rollout, the subject of mobile printing usually comes up during the first few weeks. The questions usually show up at the help desk, in the form of users who fully expected to be able to print from the new iPad or Android tablet just as easily as they did from their laptop or desktop PC.