Skip Links

Network World

Mobile Device Management Challenge

Round 1: The Mobility Management Challenge

What can mobile device and application management solutions do for you? Which is the right fit? Find out here.

Smart phones and tablets are all the rage in enterprises and are putting new demands on IT. Adding to the complexity is that employees want choices in the devices they carry – devices that might be running any of several mobile operating systems. Users also want to bring their personally owned devices to work and use them to access corporate resources. Sound familiar? If so, your challenges are many. The device needs to be provisioned and any updates installed in a timely manner. The corporate data on the device needs to be secured. This includes making sure it isn't cut and pasted into email that can be sent anywhere. Secure email and other corporate apps need to be installed and updated. If the device is lost or the employee leaves the company, all the enterprise apps and data must be wiped. This all needs to be done while complying with government regulation and industry-specific mandates while all the time maintaining user privacy. How can you meet all these challenges? We have brought together four leading suppliers of enterprise mobile management solutions to explain how their solutions make it possible to succeed at the task of managing today’s mobile environment. AirWatch, Fiberlink, Symantec and Research in Motion build cases for how they solve mobility problems and where they excel, all in a handy guide that you can download here.

Download our challenge to the mobility management industry and see how the vendors responded.

Download this white paper now
The Mobility Management Challenge series presented by Robin Layland and Joanie Wexler

Round 2: Panel Discussions

Do BYODs and Corporate-Owned Devices Require Different Management Approaches?

Industry analyst Robin Layland, John Marshall from AirWatch and Brian Duckering of Symantec explore what is needed to successfully support BYOD. They cover what policies are needed for BYOD and how to develop them. They then explore the liability and privacy issues involved with BYOD before moving on to how to secure corporate data on BYOD devices. They finish up by explaining the role of self-service in supporting BYOD.

Download this webcast now

Key Mobility Management Components

Independent analyst and editor Joanie Wexler is joined by Jonathan Dale of Fiberlink and Jeff Holleran from Research in Motion to focus on the key features your mobility management solution must have to ensure your success. The discussion centers on the key role policies play and how to develop the right policies. The discussion then moves on to explore what is needed to secure a device. The panelists then review the features needed to support BYOD and how to segment mobile apps for data security.

Download this webcast now

Enabling Bring Your Own Device (BYOD) in the Enterprise

While AirWatch strives to provide some level of direction for customers in terms of initially implementing a BYOD program, it is up to each organization’s legal, human resources, and management teams to create a device management program that is right for your organization. The example scenarios and issues in this document are provided as a courtesy and are not meant to act as official guidance or recommendations regarding device management or liability.

Download now

The 10 Commandments of BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It's as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor.

Download now

The CIO's Guide to Building a Mobile Device Management Strategy and How to Execute On It

The explosive growth of employee mobility is driving the rapid adoption of mobile devices within the enterprise. Today's smartphone and tablet devices are as powerful and capable as enterprise desktop computers were five to ten years previously. More and more employees are using smartphones and tablets to do their work regardless of time and place. However, the proliferation of mobile devices within the enterprise does not come without risk. As these devices are prone to loss and theft, managing these devices in the field can be difficult and data security is more important than ever. Enterprise Mobile Device Management (MDM) solutions are the answer to many of the issues caused by the rapid growth of smartphone and tablet use among employees. MDM provides enterprise IT with a complete set of inventory, control, and reporting tools that help make it easy to manage mobile devices almost wherever they are.

Download now

Enterprise Mobility: Enabling Productivity without Sacrificing Protection

Companies often recognize the opportunities of mobility the ability to do things they could not do before, creating new business opportunities and competitive advantages. But most businesses also see mobility as a challenge. More people are working outside of the firewall than ever before, in multiple locations, at flexible times, and on a number of different devices. This phenomenon started years ago on traditional laptops and later Macs, but today’s challenge is multiplied many times over with the introduction and tremendous popularity of smartphones and tablets. Moreover, many users are insisting on using personally owned devices, giving rise to the massive BYOD (Bring Your Own Device) movement. Now, IT organizations must not only deal with remote connections and personal devices, but also new operating systems and an unprecedented diversity of hardware.

Download now