New & Notable
Mobile policy and enforcement for consumerization News
August 01, 2014
Mobile security threats come from unlikely places. In this three-question Q&A, MobileIron's security expert offers simple ways IT admin can provide end users the freedom to work securely from their mobile devices anywhere they choose.
June 18, 2014
Dimension Data announced its mobility as a service offering for enterprises interested in simplifying mobile device, application and expense management.
November 08, 2013
The bring-your-own-device trend can put companies in hot water regarding employee privacy, but strong policy and the right tech can mitigate the risk.
September 12, 2013
A mobile workforce that uses the cloud needs their company to think about end-user segmentation to determine the best devices for their needs.
Mobile policy and enforcement for consumerization Get Started
Bring yourself up to speed with our introductory content
Implementing a mobile device security policy is a good first step, but if employees don't understand its importance, it may be all for naught. That's where training comes in. Continue Reading
Secure containers protect enterprise data on smartphones and tablets by limiting what users can do with it. IT can control everything from email to the camera in a container. Continue Reading
Employee productivity is an assessment of the efficiency of a worker or group of workers. Productivity may be evaluated in terms of the output of an employee in a specific period of time. This definition explains productivity and discusses ... Continue Reading
Evaluate Mobile policy and enforcement for consumerization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are mobile device management (MDM) and bring your own device (BYOD) passé? Some experts argue that CIOs and IT managers should zero in on mobile information management (MIM) and mobile application management (MAM) to truly gain business value from ... Continue Reading
COPE has emerged as a promising BYOD alternative, but it can cause just as many problems if not approached correctly. Continue Reading
As the initial excitement about the bring your own device trend dies down, alternate approaches to mobility are emerging. The corporate-owned, personally enabled (COPE) model aims to give more control without curbing users’ activities on smartphones... Continue Reading
Manage Mobile policy and enforcement for consumerization
Learn to apply best practices and optimize your operations.
As the Edward Snowden case shows, there's no such thing as absolute security. That doesn't mean you shouldn't try to secure your network as much as possible. Continue Reading
Not only do workers expect to be able to access enterprise applications and data from any device, anywhere, they also store data and access apps in the cloud. Read about ways that IT can keep up and maintain control over mobility and the cloud. Continue Reading
New ways of accessing apps are making cloud identity management a priority for IT shops. Take this quiz to see how ahead of the curve you are. Continue Reading
Problem Solve Mobile policy and enforcement for consumerization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As enterprise mobility management becomes more complex, IT shops need a more efficient way to control security. MCM tools can help. Continue Reading
A cohesive telecom expense management program must be based on clear policies governing how employees are reimbursed for using their own devices. Continue Reading
The policies that IT departments put in place are there to protect corporate data, but workers often go around those blocks to get work done. Continue Reading