All items tagged with "MDM"

Three Critical Business Dilemmas The iPhone 5 Will Create [Feature]

Three Critical Business Dilemmas The iPhone 5 Will Create [Feature]

Even before its launch, the iPhone 5 is creating concerns and challenges for businesses and IT departments.

Apple will launch the next iPhone (presumably named the iPhone 5) along with iOS 6 tomorrow. The new iPhone is expected to pack a range of updates that will make it a much more significant release than last year’s iPhone 4S. The biggest expectation is that the iPhone will include 4G LTE support and that, unlike the new iPad, it will support LTE bands used outside of North America.

We won’t know all the details of the iPhone 5 until Apple’s unveiling at the Yerba Buena Center. There are, however, three important issues that business users and IT managers will need to in mind during and after following tomorrow’s launch event – all three of which could have a significant impact on bring your own device (BYOD) programs that encourage users to bring their personal mobile devices into the office.

Read the rest of this post »

How To Deploy iOS 6 In Business The Right Way [Feature]

How To Deploy iOS 6 In Business The Right Way [Feature]

iOS 6 has lots of business potential, but having a plan about rolling it out is critical.

With the release of iOS 6, Apple will offer business users a range of new features. A few of which are VIP email filtering (already in Mountain Lion) with custom notifications, more options when declining a phone call on the iPhone, much-needed privacy options, and Apple’s new Do Not Disturb feature – which should help some mobile professionals to “switch off” after work and maybe even get a good night’s sleep.

iOS updates are generally designed to be user-friendly and easy enough that anyone can manage to install them. As with any major OS or business critical software upgrade, however, there may be unforeseen issues with iOS 6 – particularly when it comes to internal iOS apps and iOS access to enterprise systems.

An iOS 6 upgrade policy and strategy is something that every IT department should have in place before Apple releases iOS 6. For businesses that actively support user devices in the workplace through a BYOD (bring your own device) program, that upgrade strategy is even more critical.

Read the rest of this post »

Good Keeps Your Work From Spilling Over Into Your Personal Life On Your iPhone Or iPad

Good Keeps Your Work From Spilling Over Into Your Personal Life On Your iPhone Or iPad

The latest release of Good for Enterprise delivers more security and separation of work and personal data on an iPhone or iPad.

One of the first secure business solutions for the iPhone and iPad was Good for Enterprise, a secure collaboration tool that allows companies to separate business email, calendar, and contact systems from Apple’s standard Mail, Calendar, and Contacts apps. Going beyond simply separating work accounts and data from a user’s personal accounts, Good’s alternatives securely encrypt all data and must be unlocked using credentials other than the passcode used to unlock an iOS device.

Good released a significant update to Good for Enterprise this week, one that makes the solution more streamlined, user-friendly, and offers powerful new features – some of which are worth considering for their business functionality as well as their innate security.

Read the rest of this post »

What IT Wants To See In iOS 6 [Feature]

What IT Wants To See In iOS 6 [Feature]

iOS 6 will deliver a lot of business features, but what about enterprise/IT integration?

It’s been over two years since Apple unveiled iOS 4 with mobile management features designed to make the iPhone and iPad a significantly better corporate citizen. During those years, the landscape of business and enterprise mobility has changed dramatically. RIM has collapsed and will never truly recover, Microsoft has doubled down on the interface it launched late in 2010 with no guarantee of success, and Android has become much more enterprise friendly. Perhaps more important is the fact that idea of mobile management and security has shifted from a focus on devices to a focus on securing data and managing mobile apps.

As all this has happened, Apple’s mobile management framework, which is the system that all mobile management vendors plug into in order to secure and manage iOS devices, has essentially stagnated. With iOS 6 on the horizon, lets look at the areas that Apple needs to address if it wants iOS to remain one of the preferred mobile platforms for business.

Read the rest of this post »

How The VA Eliminated Data Breaches On iPhones And Other Mobile Devices

How The VA Eliminated Data Breaches On iPhones And Other Mobile Devices

The VA’s mobile security chief offers IT leaders five excellent tips for securing mobile devices.

Like many federal agencies, the Department of Veterans Affairs has embarked on the journey of integrating iPhones and iPads as mobile solutions. The agency currently has 20,000 mobile devices that includes iPhones and iPads along with some BlackBerries and a small number of Android devices. Despite the range of devices, the VA has been very active in trying to eliminate mobile data breaches and, according to the VA’s director of Mobile and Security Assurance Donald Kachman, the agency’s campaign has been extremely successful.

Kachman credits encryption technologies with as a major factor in that success – 99% of all VA data is now secured around the clock on mobile devices and desktop PCs. The security approach is one that can be a model for any organization.

Read the rest of this post »

Using Your iPhone For Work Will Cost You An Average Of $1,089 Each Month

Using Your iPhone For Work Will Cost You An Average Of $1,089 Each Month

Using an iPhone or iPad for work can result in some truly nasty bills.

While bring your own device (BYOD) programs that encourage employees to use their personal iPhones, iPads, and other devices in the office increases productivity and employee satisfaction, the trend is also turning those employees into workaholics. That’s not entirely a new realization – we’ve covered the potential impact of the BYOD trend on the work/life balance before (including a recent study that showed that BYOD programs actually improve that balance for IT professionals).

The latest research on BYOD’s impact on workers shows two additional insights – a significant number of employees are footing the bill (sometimes a very big bill)  for mobile data service while on the road for work.

Read the rest of this post »

How Hard Is It To Get iPads Into The Hands Of Thousands Of Students?

How Hard Is It To Get iPads Into The Hands Of Thousands Of Students?

Lexington School District One in South Carolina shows what it takes to roll out iPads to thousands of students.

Many school districts around the country are embarking on new territory this back to school season – deploying hundreds or thousands of iPads to students. Most of the deployments will be one-to-one initiatives where every student receives a school-owned iPad to use for this school year or their entire scholastic career. Planning such a roll out isn’t easy, but schools and districts making the shift this year have the advantage of looking what worked and didn’t work from counterparts that pioneered the iPad in the classroom last year.

One school district, Lexington County School District One of South Carolina, has served as a model for many other schools around the country. The district offers a lot of insight into the technical requirements, education policy issues, and roll out processes in such a colossal undertaking.

Read the rest of this post »

Half The Companies Allowing Personal iOS And Android Devices Have Suffered A Security Breach

Half The Companies Allowing Personal iOS And Android Devices Have Suffered A Security Breach

BYOD programs present security challenges some companies choose to ignore.

The most striking point in a recent report commissioned by Trend Micro was that IT administrators are beginning to rank Apple’s iOS ahead of RIM’s BlackBerry and other mobile platforms, but there were some other significant details in that report.

The report focuses on mobile security and issues related to bring your own device (BYOD) programs. Such programs encourage employees to use their personal iPhones, iPads, Android devices and other mobile technologies to access business resources and perform work related tasks. Many IT professionals believe that BYOD programs introduce security risks – and it looks like they’re right believe that. Decisive Analytics, the company that prepared the report, notes that nearly half the IT professionals that they surveyed in the U.S., U.K., and Germany admitted that their companies had already experienced a mobile-related security breach.

Read the rest of this post »

RIM’s BlackBerry Loses The Mobile Security Crown To Apple’s iPhone and iPad

RIM’s BlackBerry Loses The Mobile Security Crown To Apple’s iPhone and iPad

IT administrators have finally warmed up to the iPhone and now rank it as more secure than the BlackBerry.

The perception of the BlackBerry as the most secure and manageable mobile platform seems to be faltering. According to a new report, senior IT administrators now consider Apple’s iOS to be the most secure and manageable platform – despite the fact that RIM offers ten times the number of security and device management policies that Apple provides in iOS.

Read the rest of this post »

Major College Football Teams Join a Growing Number of NFL Teams Adopting The iPad

Major College Football Teams Join a Growing Number of NFL Teams Adopting The iPad

College football teams follow NFL teams in replacing playbooks with iPads.

Football season is just around the corner and the iPad is set to become a fixture for both college and pro teams. As we noted earlier in the year, a handful of NFL teams made the switch to iPad-based playbooks at the start of last season and more are making the switch this year. In addition to NFL teams, several colleges have announced that they are transitioning to the iPad playbook model as well.

Read the rest of this post »