MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

Setting Mobile Policies for ERP

IT Toolbox

As mobile devices proliferate companies using ERP need to deal with them. Whether you want to have a BYOD environment, or the company issues tablets or smartphones to some employees, mobile devices are out there and you have to adapt to them. This means setting and enforcing clear policies on what is acceptable use in your ERP environment.

5 Ways Mobile Device Management Drives BYOD Policy

IT Toolbox

To help them achieve this goal, software emerged on the market called mobile device management (MDM). The history of Bring Your Own Device (BYOD) has been a rocky one. Since the beginning, IT departments and business owners have tried to understand the idea and learn how to make it positive for the business instead of a headache. Rather than review specific MDM tools, however, this article

Creating End-User Mobility Policies

Data Center Knowledge

While the Age of Bring-Your-Own-Device has arrived, the implementation is where the underlying challenges start. With all of these devices, how does an IT department manage the data being delivered and how can they continue to provide a powerful end-user experience? Bill Kleyman of MTM Technologies. Industry Perspectives

Government stresses continuity of broadband policy after election

Computer Weekly

At the Connected Britain conference in London, digital minister Matt Hancock recommits to already-established broadband and mobile networking policy

Five Real-World Tips for Creating Corporate Cloud Policies

Data Center Knowledge

It's time to make some new policies. Cloud Computing Enterprise Mobility cloudAre you creating a new cloud initiative? Want to start migrating users, apps. and workloads? Read More.

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organization makes different strategies in implementing a security policy successfully. Security policies of all companies are not same, but the key motive behind them is to protect assets.

How the CIO Can Establish a BYOD Usage Policy

CIO Dashboard

If you’re grappling with putting policies and procedures in place to manage the consumer-driven transition to a bring-your-own-device workplace (BYOD), don’t worry. Do I have the right to wipe the data with a mobile management system that I require employees to install?

The Importance of an Online Encryption Policy

CTOvision

This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Once your computer or mobile device is connected to the Internet, there’s no guarantee of protection and safety of your personal files, whether you’re using it as a consumer or a corporate user. Through an online encryption policy, you can mitigate the risks and avoid these cases, whether you’re a profit or a non-profit organization.

How to Deliver Workplace Safety Training on Mobile Devices

Kitaboo

In such a situation, where the training is compulsory, but you can’t ensure 100% uptake, you can deliver it on mobile devices. Most industries have now started using mobile devices for delivery of induction training, product training and other skill development modules.

How the CIO can Sleuth Mobile Systems

CIO Dashboard

The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Fetching data from mobile devices is fraught with challenges not found in the more mature realm of personal computers.

Mobile 100

How CIOs Deal With Mobile Disruption

The Accidental Successful CIO

Mobile disruptions can happen at any time Image Credit. As CIO, because of the importance of information technology, you need to get ready to deal with the disruptions that that arrival of even more mobile technology is going to create.

Mobile 194

Experts Tackle Enterprise Mobility at Latest B2B IT Forum

The Investing Edge

Our panel of experts, led by moderator Chris Hazelton of 451 Research , provided a compelling and informative discussion on the shift to mobile within organizations of all sizes. Despite the monumental traffic on Tuesday night (where did that come from?!?),

B2B 188

How to Build a Mobile-Ready Training Program for Pharmaceutical Industry

Kitaboo

Why Should Pharmaceutical Companies Leverage a Mobile-Based Training Model? On the other hand, creating a mobile-ready training program for pharmaceutical company and employees will give them access to training materials at any time, via any device and multiple number of times. Here is How to Empower Frontline Employees with Mobile Training. In this blog, we will take a look at how pharmaceutical companies can make mobile-ready training programs for their employees.

5 Mobile Applications for Drug Testing

Galido

Information Technology Blog - - 5 Mobile Applications for Drug Testing - Information Technology Blog. Either way, you may want to try these five apps and mobile technologies that are the best if you want quick, convenient and noninvasive methods for doing a drug test. Mobile

5 mobile app development trends to watch in 2019

mrc's Cup of Joe Blog

Summary: The demand for enterprise mobile apps is growing. In this article, we explore 5 enterprise mobile app trends you can’t ignore this year. We’ve only seen incremental advancements in mobile technology and mobile app development over the past few years.

Mobile device security: A new frontier for hackers

Cloud Musings

However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks. Staples For example, a security study found that 69 percent of users store sensitive personal information on their mobile devices. Encrypt mobile device data.

Mobile 200

Microsoft Intune Policies For Samsung Knox Enabled Devices

CanITPro

While delivering last week’s CANITPRO Business Mobility Camp in Calgary, a question was brought forth in regards to what specific policies can be enforced on A Samsung KNOX enabled device via Microsoft Intune.

News on @Fixmo and Defense Information Systems Agency Mobility Management for U.S. Department of Defense

CTOvision

Defense Information Systems Agency Mobility Management for U.S. This program has been considered a core foundation to enabling the secure compliant use of a diverse selection of mobile devices, operating systems and applications by DoD personnel for years to come.

Mobile 130

All You Need to Know About VMI for Mobile Apps

Galido

VMI stands for Virtual Mobile Infrastructure and basically, it provides end users with a highly effective and an efficient way to have access to delicate mobile applications and information without much hassle. It allows end users to have the organic and unadulterated mobile experience.

9 July 2015 DoD CIO Mobility Industry Day

CTOvision

Another event we would like to bring to your attention is the AFCEA coordinated DoD CIO Mobility Industry day of 9 July 2015. Mobility is not just a major trend for DoD, but is a major driver of future mission functionality and is also posing very unique security challenges for the department. The DoD CIO seeks to inform industry of DoD plans and to solicit assistance in accelerating delivery of mobility solutions to best meet mission objectives.

BYOD and its Impact on Enterprise Content Delivery

Kitaboo

Enterprise training is slowly coming out of the traditional classroom model into being a web-based and a mobile-driven training model, where employees can now be trained on any device at any time. The global mobile data traffic is projected to increase nearly sevenfold between 2016 and 2021.

Privacy groups complain to FTC about WhatsApp policy changes

Network World

have complained to the Federal Trade Commission that changes last week in WhatsApp’s terms and privacy policy breaks its previous promise that user data collected would not be used or disclosed for marketing purposes. WhatsApp said last week it will be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. Privacy groups in the U.S.

Young Turks in the Enterprise

The Investing Edge

Ascent’s portfolio company Verivo , for example, supports BYOD by enabling businesses to build, manage, and deploy mobile apps across heterogeneous platforms.

Privacy groups complain to FTC over Google’s 'deceptive' policy change

Network World

Privacy groups have complained to the Federal Trade Commission that Google is encroaching on user privacy through a policy change in June that allows it to combine personally-identifiable information with browsing data collected by its DoubleClick digital advertising service.

Have You Correctly Estimated Your Company’s Demand For Mobile?

The Accidental Successful CIO

First it was mobile phones, now its tablets… Image Credit: Nana B Agyei. Before then, mobile phones were just that – phones. What might surprise a number of people with the CIO job is that there is one department in the company in which the mobile properties of an iPad tablet most appealed to. What the sales teams are going to be looking to the IT department to do is to set polices regarding how the devices can be used and also implementing mobile device management systems.

Mobile 109

BYOD: Is This A Good Thing Or A Bad Thing For CIOs?

The Accidental Successful CIO

Consumer electronic prices have gotten so low that the company’s employees can now purchase mobile phones and powerful tablets that only a few years ago the company would have had to provide them with. Sure BYOD seems like a good idea, but is there a down side?

Ascent Index: BYOD (June 6 – June 20)

The Investing Edge

One reason for the uptick could be the latest Fortinet study , which found that more than half of workers in their twenties believe it is their “right” rather than a privilege to use their own mobile devices at work.

B2B 141

Guided Hands-on Lab: BYOD Mobile Device Management with.

IT Pros Rock!

Guided Hands-on Lab: BYOD Mobile Device Management with System Center 2012 SP1 and Windows Intune. Guided Hands-on Lab: BYOD Mobile Device Management with System Center 2012 SP1 and Windows Intune. Guided Hands-on Lab: BYOD Mobile Device Management with System Center 2012 SP1 and Windows Intune. How do we support IT applications, data and security policies in this new BYOD age? Create an APN certificate for mobile device management. Sign in. IT Pros ROCK!

How to maintain data and document security with a mobile workforce

Network World

Pragmatic approach Image by Thinkstock Data and document security with today’s mobile workforce can be a difficult challenge.

Mobilizing the Enterprise - A Screw's Loose

A Screw's Loose

Mobilizing the Enterprise. I spend a lot of time talking to people about the mobile enterprise. Sometimes it’s people I work with, or friends who work at other companies, over twitter, or just people who reach out to ask a question or two about mobilizing their company. A lot of these questions tend to focus on BYOD (Bring your own device) initiatives and other want to talk about how to do apps on mobile devices. There has to be a reason to go mobile. Mobile.

USMC and DoD Rapid Reaction Technology Office Seeks Info On Six Categories of Technology: Please review and engage

CTOvision

Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of. By Bob Gourley.

Study 110

Simplifying Mobile App Data Management with DynamoDB's Fine-Grained Access Control

All Things Distributed

Speed of development, scalability, and simplicity of management are among the critical needs of mobile developers. As I have mentioned previously , companies like Crittercism and Dropcam have already built exciting mobile businesses leveraging DynamoDB.

How to Make Workplace Safety Training Modules Future Ready

Kitaboo

And what better way to do that than use a mobile platform? A workplace safety training module is best delivered on a mobile platform as we will see further in this post. Also read: [Guide] How to Deliver Workplace Safety Training on Mobile Devices.

Google, like Samsung, is eavesdropping on your private conversations

CTOvision

Samsung Flaw Lets Hacker Easily Take Control of Your Galaxy Mobile Remotely (thehackernews.com). Samsung Tweaks Television Policy Over Privacy Concerns (bits.blogs.nytimes.com). If you use Google Chrome , you could be subject to eavesdropping by Google.

Google 198