Access your Pro+ Content below.
SMB mobile strategies hit roadblocks
"Go big or go home" is a common battle cry for people taking on a new challenge, but when it comes to enterprise mobility, some organizations just have to go small. Small and medium-size businesses don't have the capital to buy expensive mobility services, hire in-demand developers or recover from major security breaches. Fortunately, there are some products out there that can help -- and an SMB mobile strategy should focus on security capabilities first and foremost.
Meanwhile, many larger companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. In his column this month, Eric Klein explores how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets. The next steps are ensuring that mobile application code is secure and threat detection software is in place, which Maribel Lopez tackles in her column. This issue's Device Spotlight takes a look at a 2-in-1 tablet from Huawei as the company gains a foothold in the United States. We also look ahead to a few conferences end-user computing pros should consider attending in the final months of the year.
Access this PRO+ Content for Free!
Features in this issue
The big four independent software vendors -- IBM, Microsoft, Oracle and SAP -- are getting in on the mobile app dev game with new tools. There are several that IT pros can give a spin.
To build more advanced business apps, IT should incorporate the latest mobile device features, such as geolocation data, integrated communications and specialized sensors.
Huawei's MateBook is a cheaper alternative to other 2-in-1s on the market, and it still ticks all the boxes enterprise users could need.
The biggest mobile security threats aren't hiding in the shadows. For IT admins who don't properly secure mobile devices and apps, the monster is in the mirror.
News in this issue
Not every company has the means to dive into enterprise mobility and splurge on pricey services or developers. But there are products that can help SMBs make the mobile transition.
Columns in this issue
No company is safe from potential data leaks and breaches. To combat the biggest mobile security challenges, IT needs a four-pronged line of defense.