RIM’s BlackBerry Loses The Mobile Security Crown To Apple’s iPhone and iPad

By

IT administrators have finally warmed up to the iPhone and now rank it as more secure than the BlackBerry.
IT administrators have finally warmed up to the iPhone and now rank it as more secure than the BlackBerry.

The perception of the BlackBerry as the most secure and manageable mobile platform seems to be faltering. According to a new report, senior IT administrators now consider Apple’s iOS to be the most secure and manageable platform – despite the fact that RIM offers ten times the number of security and device management policies that Apple provides in iOS.

Study Shows Most IT Departments Fail To Explain Or Enforce iPhone/iPad Security

By

A new study shows that IT departments are dropping the ball when it comes to explaining and enforcing mobile security.
A new study shows that IT departments are dropping the ball when it comes to mobile security.

Another study of the bring your own device (BYOD) phenomenon concludes that the trend of employees bringing the personal iPhones, iPads, and other devices into the office shows no sign of slowing down. It also confirms previous reports that indicate many personal devices being used in the workplace don’t have even basic security features enabled.

The study by Coalfire, a company the specializes in IT risk management services, paints a particularly grim picture of the lack of security for iOS and Android devices in the workplace. With the BYOD trend show no signs of slowing or ending, Coalfire CEO Rick Dakin, notes that companies cannot afford to keep ignoring mobile security concerns.

How One Company Made A Multi-Million Dollar Blunder In Buying 14,000 iPads

By

Coming soon to a Department of Defense near you?
What can businesses learn from a company that spent millions of dollars on thousands of iPads without knowing how they'd be used?

I’ve been a big proponent of the iPad in business since Apple first announced its tablet more than two and a half years ago. In that time, the iPad has more than proved its value in companies of all different sizes and across virtually every industry. That said, the iPad isn’t a fit for every job within every workplace. If a company is considering investing in iPads for its employees, one of the first things that company and its IT leaders need understand is how the iPad will be used.

That seems like a pretty basic step in the procurement process, but it’s one that seems to be getting overlooked by some companies – including one very large enterprise company that should have known better.

Many Organizations Are Unprepared For Mass Adoption Of Employee iPhones and iPads

By

BYOD programs are here to stay, but many companies still don't secure employee devices.
BYOD programs are here to stay, but many companies still don't secure employee devices.

The number of personally-owned iPads, iPhones, and other mobile devices that professionals bring into office is expected to more than double between now and 2014. That means the businesses that have so far been lax about considering or planning an official bring your own device (BYOD) program and/or establishing security policies around BYOD are going to need to play catch up – and they’ll need to get started as soon as possible.

Why Apps (Not MDM) Are The Future Of iPhone Management [Feature]

By

Mobile management means securing apps and content as well as locking down devices.
Mobile management means securing apps and content as well as locking down devices.

There are plenty of stories out there about the explosive growth of mobile technology in the workplace. The trend towards bring your on device (BYOD) models in which employees are allowed or encouraged to bring their own iPhones, iPads, and other devices into the office is driving a massive expansion of the number of mobile devices used for work tasks. At the same time, the annual (or even more frequent) device an OS release cycles that have become common are driving up diversity of devices and resetting the mobile technology playing field every few months.

That constant change is forcing the IT professionals to adapt to new devices, apps, use cases, network models, and security threats faster than anything the IT industry has ever seen.

This is particularly visible in the mobile management space. A year ago, the primary method for handling mobile device and data security was to manage and lock down the device itself using one of dozens of mobile device management (MDM) suites on the market. Over the past six to nine months, however, MDM has been replaced by mobile app management (MAM) as the best way to secure business data. That’s a warp-speed transition in the mindset and goals of IT professionals.