In your efforts to embrace (or at least tolerate) consumerization and plan effective enterprise mobile management, you're going to have questions: How can I secure data on employee-owned devices? What is mobile application management? What are the risks of end users forwarding corporate email to their personal accounts?
We've done our best to answer these questions and others for you in short, sweet FAQs. Now we've put all of these BYOD, security, enterprise mobile management and consumerization FAQs in the same place for easy access. If you have questions we haven't answered yet, let us know!
Table of contents:
How IT can learn to stop worrying and love BYOD
Finding ways to manage tablets and smartphones is tough, but IT can do it with mobile device management (MDM). Keep in mind, however, that there are lots of ways you can use MDM, and there are even more features to consider. If you need some MDM queries quelled, our MDM FAQ is a good place to start.
Answers to IT's BYOD questions
Consumer devices showed up in the enterprise, uninvited and without a manual. Naturally, IT pros have questions about how to make application delivery, BYOD security and policies work. This FAQ can help put some BYOD questions to rest.
Enterprise mobile management FAQs
Enterprise mobile management with Exchange ActiveSync
In trying to deal with the influx of mobile devices in the enterprise, admins may turn to ActiveSync. ActiveSync can help in some cases, but not all devices are compatible with all its mobile management features.
Intro to mobile application management
What the heck is mobile application management (MAM)? It's a way to do enterprise mobile management without worrying about all the different smartphones and tablets on the market. With MAM, the focus is on apps, not devices.
How to keep devices safe from Android threats
Even though app security on Android devices is a major issue, there are ways for IT to oversee Android app security and put a stop to malware threats. Users and admins can work together to defend Android devices from malware and other threats. Train users on device security and encourage them to use screen locks and other forms of device protection on their end.
Risks, fixes and the future of iPhone security
More iPhones in your organization means more iPhone security issues to be concerned with. Siri, malicious attacks and jailbreaking all put iPhones at risk, but cryptographic protection is on the horizon.
More consumerization of IT FAQs
Cloud email services mix business with pleasure
Users aren't typically in love with corporate email systems. That's why they use cloud email services on the side. If you want employees to keep their business messages in a corporate inbox, you're going to have to give them a reason to.
Social collaboration software for not-so-social IT departments
Facebook and Twitter have changed end users' expectations when it comes to communicating and sharing information. Social collaboration software can address these changes in the enterprise, but you have to roll it out correctly. Check out how you can make social networking happen in your organization.
Answering IT's top iPad questions
Apple's iPad can be great for enterprise use, but it's nowhere near perfect. Admins complain that it's not easy to manage, but some good enterprise apps and use cases might make allowing enterprise iPad use worth IT's while.