Access your Pro+ Content below.
Building a mobile business
Mobile devices can improve productivity, but IT and vendors are catching up with enterprise mobility management strategies and products that must balance access with security
CHAPTERS AVAILABLE FOR FREE ACCESS
Mobility is such a radical departure from traditional enterprise computing that business and IT leaders sometimes don’t even know where to start. This e-book takes readers through the process of enabling and managing a secure mobile workforce. End users love mobility, but its benefits for businesses aren’t always as clear. This chapter explains how mobility can improve productivity and increase agility—and why security concerns, while important, shouldn’t stop mobility from taking off.Download
Applications are the engine that makes mobility run. This chapter covers the different approaches to bringing enterprise software functionality to smartphones and tablets. Options include in-house development, third-party apps, virtualization and application refactoring. Organizations must ensure that internally developed apps are consistent. Third-party and off-the-shelf apps offer flexibility and economies of scale, but they shouldn't require much customization, or the time and money saved is lost. Mobile application management (MAM) is often included with enterprise mobility management tools, but it can also be found as a standalone utility. A mobile security strategy and MAM should account for device loss, malware, and separation of personal and enterprise apps and data. Threats are constantly evolving. IT should also know mobile security best practices such as app containerization, dual persona and controls over document sharing.Download