iPhone and BlackBerry: IT Managers Guide To Managing Personal Devices in the Enterprise


Click here to download now

Source: Sybase
Date: July 2010
Type: White Paper
Rating: (0)

Overview: You can’t avoid it any longer: Developing a strategy for managing and securing employees’ personal mobile devices. iPhone and Google Android devices are joining BlackBerry, Symbian and Windows Mobile smartphones in the workplace, and their numbers are only increasing. Regardless of whether corporate policy allows them, workers are still bringing their personal devices into the office.

According to a recent Forrester Research report, almost half of U.S. and European businesses surveyed are embracing the notion of allowing personally-owned devices access to secure networks. One-quarter of businesses surveyed do provide full support to some personal devices, and another 21 percent provide at least limited support.

What these companies are realizing is that if they allow employees with personally owned devices to access corporate email and other resources, they will be more productive. In addition, in today’s economic times, enabling personal devices helps companies offload some of the cost because users are paying for these devices themselves.

Corporate IT departments naturally are cautious about opening up the network and allowing full access to any device. IT needs control over how and under what circumstances mobile devices can access corporate systems. Finding just the right balance—maintaining the integrity and security of the network while allowing easy access to the applications users need to be more productive—will give organizations a competitive advantage in the coming years.

Get this paper and learn how you can create a more secure and manageable mobile enterprise.

Not what you're looking for? Search again
Go Advanced »
More From the Smartphones Section

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality

Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++

Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture

Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors

Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy

Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends

Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems

Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention

Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications

Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

More Mobility Resources

Optimize the In-Store Experience
Many retailers are having a hard time breaking out of the economy's current stagnation. Store optimization that goes beyond a building's four walls to take ......

Empowering Your Mobile Worker
Today's most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company's IT strategy has to be ready to support them with easy, reliable, 24/7 access to the business information they need, from anywhere in the world, across a broad range of communication devices. Find out how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments


More On Mobility