This article is part of an Essential Guide, our editor-selected collection of our best articles, videos and other content on this topic. Explore more in this guide:
3. - Videos: Read more in this section
- 'Everyone is God on his own device'
- Mobile threats to be aware of
- Choose realistic rules to improve your policy
Explore other sections in this guide:
Mobile device policy: How to create, apply and enforce rational rulesDate: Nov 03, 2010
In the era of the distributed enterprise, organizations everywhere face multifaceted mobility challenges that require adaptable, well-considered mobile device policy solutions. They must determine what constitutes acceptable use of mobile devices like smartphones, netbooks and tablet PCs, balancing users' accessibility and performance needs with mobile device security and mobile data safety concerns.
The easiest way to ensure that mobile device adoption contributes to, rather than impedes, the accomplishment of an organization's goals is to establish -- and strongly enforce -- a clearly drawn mobile device policy. In this video, SearchMobileComputing.com's Rivka Little speaks with Michael Finneran, principal consultant and analyst at dBrn Associates, about developing a mobile device policy, applying policies to the growing number of mobile users in the enterprise, and the importance of organizations recognizing mobility as a potential business game-changer.
Finneran also discusses applying a mobile device policy on a per-user and per-application basis, identifies several best practices for mobility in the enterprise (starting, of course, with actually having a mobile device policy) and touches on some issues that the new wave of enterprise tablet PCs pose for maintaining mobile security.
About the speaker:
Michael Finneran is an independent consultant and industry analyst who specializes in wireless technologies, mobile unified communications and fixed-mobile convergence. With more than 30 years in the networking field and a broad range of experience, Finneran is a widely recognized expert in the field. He is the author of Voice Over Wireless LANs -- The Complete Guide (Elsevier, 2008). His expertise spans the full range of wireless technologies, including Wi-Fi, 3G/4G cellular, WiMAX and RFID.