Mobile Policies and Procedures News
February 02, 2012
BYOD enterprise policies are creating new remote access problems on the WAN. Find out how to get a better handle on iPads and smartphones invading your VPN.
February 21, 2011
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.
February 16, 2010
Successful mobile device management includes collecting and maintaining tax documentation, managing expense reports and streamlining mobile device administration costs. Learn about the tax liabilities associated with inaccurate mobile usage reports,...
August 29, 2007
Mobile security is not top-of-mind for many mobile workers, according to recent research by Cisco and the National Cyber Security Alliance.
Mobile Policies and Procedures Get Started
Bring yourself up to speed with our introductory content
When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Mobile Policies and Procedures Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
There's a lot of confusion surrounding the HIPAA compliance requirements for mobile health apps. Expert Mike Chapple finally clears it up for health app vendors. Continue Reading
Following mobile application security best practices can aid IT's mobile application management efforts and mitigate the risks of employees installing mobile apps on their devices. Continue Reading
Users love downloading apps, which can make mobile application security, especially on employee-owned BYO devices, difficult to ensure. Find out how to improve mobile app security. Continue Reading
Manage Mobile Policies and Procedures
Learn to apply best practices and optimize your operations.
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
Learn about the core functions of mobile device management (MDM) systems so you can select the most comprehensive MDM system for your enterprise needs. Continue Reading
As enterprise iPad use increases, companies must make decisions about iPad security policy and how to enforce it. Lisa Phifer offers several tactics for ensuring iPad endpoint integrity. Continue Reading
Problem Solve Mobile Policies and Procedures Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified ... Continue Reading
No business should operate today without a solid plan for the security of data on mobile devices, networks and applications. Continue Reading