Mobile device policy: How to create, apply and enforce rational rules

Mobile device policy: How to create, apply and enforce rational rules

Mobile device policy: How to create, apply and enforce rational rules

Date: Nov 03, 2010

In the era of the distributed enterprise, organizations everywhere face multifaceted mobility challenges that require adaptable, well-considered mobile device policy solutions. They must determine what constitutes acceptable use of mobile devices like smartphones, netbooks and tablet PCs, balancing users' accessibility and performance needs with mobile device security and mobile data safety concerns.

The easiest way to ensure that mobile device adoption contributes to, rather than impedes, the accomplishment of an organization's goals is to establish -- and strongly enforce -- a clearly drawn mobile device policy. In this video, SearchMobileComputing.com's Rivka Little speaks with Michael Finneran, principal consultant and analyst at dBrn Associates, about developing a mobile device policy, applying policies to the growing number of mobile users in the enterprise, and the importance of organizations recognizing mobility as a potential business game-changer.

Finneran also discusses applying a mobile device policy on a per-user and per-application basis, identifies several best practices for mobility in the enterprise (starting, of course, with actually having a mobile device policy) and touches on some issues that the new wave of enterprise tablet PCs pose for maintaining mobile security.

About the speaker:

Michael Finneran is an independent consultant and industry analyst who specializes in wireless technologies, mobile unified communications and fixed-mobile convergence. With more than 30 years in the networking field and a broad range of experience, Finneran is a widely recognized expert in the field. He is the author of Voice Over Wireless LANs -- The Complete Guide (Elsevier, 2008). His expertise spans the full range of wireless technologies, including Wi-Fi, 3G/4G cellular, WiMAX and RFID.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: