Category Archives: BYOD



The Four Most Important MDM Security Features

Wednesday, August 13, 2014

  As businesses continue to see the benefits that mobile device management services bring to profit margins and productivity levels, questions over security still remain. What should your company be looking for when shopping around for services that can help keep sensitive data safe?   Security Roles The levels at which a business uses its mobile services are likely to vary. Giving the wrong people access to specific information can seriously jeopardize the future of any company. That’s why it’s important that the service you choose provides different security roles depending on each type of user. Businesses are likely to need a default “everyone” security level with a limited, yet open, data access window for all workers. This is especially … Continue reading »


5 MDM Selection and Implementation Mistakes

Tuesday, July 29, 2014

We’ve helped over 100 companies with MDM selection and implementation, and here are the most common challenges that we’ve seen. Policies that don’t balance all stakeholder needs  Security is important to the company, but so is user experience. Is it possible to be too secure? The answer is yes, if you don’t take into consideration end users and their desire for ease of use with their devices. You could implement policies that make using a mobile device so onerous that people actually become less productive. On the flip side, you could give up too much control to your end users. Balance is the key. Viewing MDM software as commodity Because there are limitations on MDM functionality that are imposed by … Continue reading »


MDM Software: An Essential Checklist

Thursday, July 17, 2014

With a ton of telecommunications services out on the market, and with each offering its own software model, just where do businesses searching for mobile solutions start? Knowing what you need and what you don’t from mobile device management software can be a tough challenge indeed. Stick with these main features however and you can rest easy with any investment you make.   Profile and Network Usage Every user on your network should have access to two things. Without these features your network might experience severe hitches. The first requisite of the software you choose is that it should provide every user of your network with a profile. The second is that each profile must also display the amount of … Continue reading »


Even IBM Is Struggling With BYOD

Wednesday, May 30, 2012

“The trend toward employee-owned devices isn’t saving IBM any money, says Jeanette Horan, who is IBM’s chief information officer and oversees all the company’s internal use of IT. Instead, she says, it has created new challenges for her department of 5,000 people, because employees’ devices are full of software that IBM doesn’t control.” http://www.technologyreview.com/business/40324/?p1=BI IBM has had a BYOD program since 2010, and out of about 400,000 employees, they’re using 40,000 Blackberrys, and 80,000 other smartphones and tablets, some of them employee owned. Some advantages that IBM has that you (probably) don’t: Technology as core competency of the company Internal tools – they sell their own MDM software and have their own cloud storage application, MyMobileHub Scale IBM is one … Continue reading »


5 Overlooked BYOD Mistakes to Avoid

Monday, March 12, 2012

Article published in CIO Update: Businesses of all shapes and sizes are struggling with the bring your own device (BYOD) phenomena. On one hand, BYOD is a boon. Employees get the devices they like. Often they pay for them out of their own pockets, and productivity goes up. On the other hand, support costs can also go up, bandwidth may become saturated and, if policies aren’t crafted well, employees can end up feeling cheated by their employers. Creating a workable BYOD policy isn’t rocket science, but it is a delicate balancing act. Get it right, and you’ll boost both productivity and employee morale. Get it wrong, and you’ll need to start worrying about both security risks and increasingly disgruntled workers. … Continue reading »


Lessons Learned from a Bring Your Own Device Project

Monday, February 27, 2012

Originally published at No Jitter. By Robert Lee Harris I spent a lot of last summer working with a large enterprise IT department transition from company-owned Blackberries to employee-owned devices. Here’s what I took away from the experience. This was a BYOD (Bring Your Own Device) project much like many companies are now considering. Being involved in the real-life execution of the strategy is, to say the least, a learning experience. This article is titled “Lessons Learned,” but it does not include every lesson learned. That would be too much reading! Instead, I have listed some key points that are likely to apply to most enterprises considering a BYOD plan. 1. Not Everyone Wants to Bring Their Own DeviceIt is probably hard … Continue reading »


BYOD Survey – Learn more about other companies’ policies

Friday, February 24, 2012

There’s a lot of buzz around BYOD in an increasingly mobile workforce, but little consensus around rules and guidelines to be incorporated in a policy.  Whether you’ve just started planning your BYOD policy, or have already implemented one, we’d love to hear about your thoughts and experiences. You can learn more about what other companies are doing in their policies by participating in this survey, being conducted by Software Advice.   The results will be published in March, so come back to this blog for the results! Click here for the survey.


How to COPE with Consumerization of IT

Thursday, February 16, 2012

Philippe Winthrop wrote an article, and proposed the term COPE (yes, another acronym) to describe another way to manage consumerization of IT: Corporate Owned, Personally Enabled. “The IT department would provide you ANY mobile device you want…that’s because they have embraced the Consumerization of IT.  However, as opposed to trying to find a way to secure the corporate data that will reside on the employees’ personal devices, why not instead provide the employees a means to put some personal content on their work devices?  The device (and the corporate data that resides on it) is fully managed and controlled, but also allows for employees to install the apps they like for their personal use.  We already see this in many organizations … Continue reading »


Confusion About BYOD Issues

Friday, January 20, 2012

There are two separate issues involved with BYOD (Bring Your Own Device) policies that seem to get constantly mixed up: Who pays for the device Choice of device   Who pays for the device With the proliferation of smartphones in the general population, many employees who did not previously have a corporate paid device, and who didn’t necessarily require mobile access to do their jobs, are now asking to be able to use their own devices at work. Since these devices belong to the employees, this is truly a BYOD phenomenon. Companies may benefit from increased productivity amongst users who are keen to check email more frequently on their shiny new toys business productivity tools. Employees may also be happier, … Continue reading »


Top Five Mobile Challenges for CIOs in 2012

Monday, January 9, 2012

Article published in Wireless Business & Technology: 2012 is shaping up to be a challenging year for CIOs as they figure out how to safely embrace the slew of mobile devices entering their networks. Smartphones and tablets are seriously threatening the IT status quo, and CIOs who fail to adapt and get ahead of this technological upheaval risk getting pink slips and seeing themselves replaced by more agile colleagues. Clearly, 2012 is the year that organizations of all shapes and sizes must come to terms with their mobile problem. Here are five serious mobile challenges CIOs will have to deal with in 2012… http://wireless.sys-con.com/node/2118812 _____________ There is so much happening with mobility in the enterprise, and it’s happening so quickly. We … Continue reading »