Mobile Device Management Glossary
[ Source: Fiberlink ]
May 2012-
The team at MaaS360 talk to prospects and customers about Mobile Device Management (MDM) every day. It has been noticed that there are a number of people looking for basic information regarding MDM. To help the community, this document has been prepared to contain a glossary of important mobile device management terms. Examples include ActiveSync, APNS, SCEP and OTA Configuration.
Conquering today's Bring Your Own Device Challenges
[ Source: Aruba Networks ]
March 2012-
A BYOD solution should automate the device onboarding process for employees
and guests, as well as the administration and enforcement of policies, by gathering information about the context of the device, user and connection. BYOD also requires real-time visibility and reporting to quickly measure, enforce, and meet compliance mandates.
Smartphone And Tablet Management: Best Practices Guide
[ Source: Fiberlink ]
September 2011-
More businesses than ever are confronting how to fully embrace mobile devices beyond their executive and sales teams. In a way, IT teams are being dragged into this. Many users have fully incorporated smartphones and tablets into their daily lives and use corporate-issued and personally-owned iPhones, iPads, and Android devices to access corporate data. They have also adopted application stores in their personal lives, blending activities like web browsing, games, and mobile payments with business ...
Secure Business Intelligence on Apple Mobile Devices
[ Source: Microstrategy ]
March 2011-
Mobile Business Intelligence (“BI”) applications offer compelling ways for enterprises to share information with employees, customers, and partners wherever they need it. Due to the nature of mobile devices, these applications (“apps”) present new security challenges that must be addressed by both the BI platform and the security capabilities of mobile devices. Data access, data transmission, and data storage must all be considered when deploying a complete and secure solution.
This paper will ...
Secure Smartphone Apps: The Next Generation
[ Source: BlackBerry ]
April 2010-
The latest smartphone applications foster more mobility and productivity than ever before—as long as a secure mobile network is in place.
Secure Smartphone Apps: The Next Generation It’s no secret: Smartphones are
infiltrating the corporate world and making employees more productive.
Their use is no longer dictated by IT departments that provision them to
executives and sales people. The rankand-file are buying them and receiving
them as holiday gifts. And thanks ...
The CIO's Guide to Mobile Security
[ Source: BlackBerry ]
March 2010-
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy.
Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Mobile Device Management
[ Source: Sybase ]
June 2009-
Did you know that up to 70% of enterprise data exists in various frontline settings, from laptops to handheld devices, to store and remote office environments?
Your frontline workers may have a variety of skills but they’re rarely IT savvy and certainly not security experts. Yet more than 75% of enterprises leave responsibility for security in the hands of the user – literally.
With the increase in the use of mobile devices, you ...
Bring Order to Chaos: A Guide for Creating a Corporate Mobility Policy
[ Source: Nokia ]
July 2008-
Working within IT, you’ve likely received countless requests from different users and departments for mobile access to corporate applications and data. On the surface, these requests may seem easy enough to address — but without a clearly defined mobility policy in place, acting on them can lead to a host of problems ranging from data security breaches to excessive mobile device and support costs. This white paper will help you gain control over your mobile ...
The 10 Commandments of BYOD
[ Source: Fiberlink ]
May 2012-
BYOD offers employees and corporations countless business benefits from increased efficiency to controlled costs on provisioning a mobile workforce. For IT, BYOD is not as clear. Concerns over securing corporate data to managing a multitude of disparate devices present valid challenges, but none are insurmountable.
The Ten Commandments of BYOD covers the following topics:
• BYOD policy considerations
• Device discovery
• Enrollment best-practices
• Over-the-air configuration
• ...
Health Care Sensor Networks - Architecture and Protocols
[ Source: Old City Publishing ]
January 2008-
Wireless sensor networks research is primarily focused on large networks of tiny devices with sensing capabilities, able to perform simple data processing tasks and to communicate wirelessly between themselves to exchange data. Once devices are deployed, networks are established automatically using self-organization protocols. Data is forwarded to appropriate sensor nodes using multi-hop routing protocols. This paper from Old City Publishing explains architecture of a health-care system based on personal mobile health-care sensor networks is proposed ...