InformationWeek: The Business Value of Technology

InformationWeek: The Business Value of Technology
InformationWeek Big Data Coverage
= Member Content
Facebook Twitter Share

E-mail | Print | Permalink | LinkedIn | RSS

RIM CIO Talks Enterprise BYOD


CIO Robin Bienfait talks about RIM's enterprise-friendly features like BlackBerry Balance, security and apps, and welcoming iOS and Android devices into the mix.




SAN DIEGO -- CTIA MobileCON 2012 -- Research In Motion maintains that it builds the best, most robust, and secure option for the enterprise, but it also knows it's far from the only one anymore.

RIM CIO Robin Bienfait addressed CTIA attendees Wednesday morning, urging them to adapt and plan ahead for the surge in mobility in the workforce. It was an ironic message given RIM's laborious and oft-delayed process of launching BlackBerry 10. But, Bienfait assured the audience that the new operating system would be rebuilt from the ground up with the enterprise in mind. (See RIM Posts $235M Net Loss as Sales Slip, RIM Delays BlackBerry 10 Phones 'Til 2013, and Can RIM Get Its Enterprise Groove Back?)

At the same time, she admitted that Android and iOS are becoming pervasive forces in the enterprise as more companies allow employees to bring their own devices. She said that RIM plans to support both iOS and Android devices with its security and BlackBerry Mobile Fusion mobile device management (MDM) platform. (See RIM Hosts a Bring-Your-Own Bash and RIM Plays Nice in the Enterprise.)

Read the rest of this article on Light Reading.

Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).




InformationWeek encourages readers to engage in spirited, healthy debate, including taking us to task. However, InformationWeek moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. InformationWeek further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.
Subscribe to RSS


Advertisement


InformationWeek Reports

report Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.

report Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.

report Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.

report Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.