As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.
Stories by Bob Violino
Without network support, businesses may not be able to reap all the benefits of the data IoT generates.
Enterprise mobility management tools are evolving far past their mobile device management roots. New features include better analytics, integration with Office 365, mobile identity management -- and preparing for the internet of things.
Security executives have taken on much more responsibility and visibility in recent years as threats to corporate information assets and physical resources have increased.
Regulations aimed at protecting the security and privacy of organizations and individuals are well meaning. But sometimes these standards, or how they're interpreted, can be more than a nuisance--they can actually contribute to weaker security.
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet.
Bland by name and superficially viewed as gee-whiz technology never to be realized, the Internet of things (IoT) has significant potential to transform business. Early forays into Net-enabling physical objects are already pointing the way.
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
Chances are you've heard about the Internet of Things (IoT)—or you will soon enough. The term carries a number of definitions. But in general, the IoT refers to uniquely identifiable objects, such as corporate assets or consumer goods, and their virtual representations in an Internet-like structure.
Radio-frequency identification (RFID) technology has shown promise as a way to monitor the movement and even the condition of all sorts of objects.
If you're CIO at a large enterprise -- or a small one, for that matter -- chances are good that you're seeing a steady rise in the number of employees using smartphones and tablets at work.
In the past 18 months, the IT group at KPMG has helped update and create new processes and workflows for the company's paper-, energy- and carbon-intensive systems.
- Voice Engineer ACT
- Technical Analyst, Cybercrime Operations ACT
- Technical Analyst, Cybercrime Operations VIC
- Presales Security Solutions Architect VIC
- SAP FICO Consultant NSW
- Security Engineer/Analyst ACT
- Senior Full Stack .Net Developer WA
- Project Delivery Coordinator QLD
- Project Coordinator VIC
- Junior / Mid level Hogan Technical Consultant - Brisbane VIC
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.