Consumerization Topics

Enterprise mobility management

Mobile devices and applications in the enterprise require strong security and intricate management. The first step towards enterprise mobility management is having a mobile device management strategy, which should involve patching and upgrading, logging and auditing, performance monitoring, access control and device security. Enterprise mobility management also includes mobile application management and information management, which can secure software and data on a more granular level. In addition, an enterprise device management strategy should align with policy to control what mobile device users can and can't do with their devices. Every mobility management strategy will differ depending on an organization's specific needs. More about Enterprise mobility management

Cloud and social software

Cloud computing applications, which are accessible from anywhere and often free, are catching on among end users. Despite its benefits, this trend is concerning for employers, because managing cloud computing applications is a difficult task for IT. If an employee uploads sensitive documents to a cloud storage service, for example, the business’ bottom line is at risk if a data breach occurs. Social collaboration software, which offers Facebook and Twitter-like functionality for business users and makes it easy to share data, only compounds the problems for IT. Some of the top cloud applications among end users are Dropbox, Gmail and even Salesforce.com. Managing cloud computing and social collaboration applications will be crucial as the consumerization of IT evolves. More about Cloud and social software

Securing mobile devices and data

Securing mobile devices is critical for IT administrators dealing with consumerization. Employees’ mobile devices are especially vulnerable because they often live outside the firewall, and users access both work and personal information from the same device. Client security is especially tricky because users often use several identities or logins on one device, and employers may be unaware of where work activity is occurring. There are also other issues that make securing mobile devices no easy task. In addition, cloud security comes into play when users access services such as Dropbox or Gmail for work purposes. IT departments don’t control these services, so protecting corporate data should be the top cloud security priority. The resources in this section cover data protection and mobile device security tips for IT professionals. More about Securing mobile devices and data

Smartphone and tablet hardware

PCs aren’t the only concern for desktop admins anymore. Smartphone and tablet hardware is driving an increase in the number of endpoints IT departments must deal with. The news and how-to articles in this section cover smartphone hardware from Apple, Research in Motion (RIM) and the vendors that manufacture Android and Microsoft Windows mobile phones, including Samsung, Motorola, HTC and Nokia. These resources also cover the Apple iPad and other tablet hardware, plus the processors that power these devices and the wireless carriers that serve them. Compare the most popular tablet and smartphone hardware on the market to determine if these devices can make your employees more efficient -- and how they might fit into your IT department’s endpoint strategy. More about Smartphone and tablet hardware

Mobile device OSes and apps

Managing tablet and smartphone operating systems will force IT administrators to step out of their comfort zones. Most of the major smartphone operating systems used in enterprises focus on the consumer, not business users. Apple’s iOS and Google’s Android are helping to drive the consumerization of IT, and even the business-focused Microsoft is making its Windows Phone operating system more consumer-friendly. The same holds true when it comes to tablet operating systems, where iOS on the iPad is leading the charge. The resources in this section include news on the latest smartphone and tablet operating systems, plus tips on how to manage and secure them. You’ll also find information on the new wave of tablet and smartphone applications that employees are using to do work on mobile devices. Much like the operating systems they run on, many of these tablet and smartphone applications will be new to IT admins. More about Mobile device OSes and apps