Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

Credit to Author: Lucas Mearian| Date: Mon, 04 Nov 2019 03:00:00 -0800

While one in three large enterprises has a chief mobility officer (CMO), according to one survey, that role is now largely duplicative and unnecessary – and creating it can hit a company’s bottom line.

Management consultancy Janco Associates, which lists job descriptions and conducts bi-annual salary surveys, last week updated its description of a Chief Mobility Officer (CMO) to include privacy compliance policies in light of the California Consumer Privacy Act (CaCPA), which goes into effect in January.

“As the use of personal mobile devices, social networking, and compliance requirements expand, organizations are faced with a dilemma. How can they balance privacy compliance mandates like CaCPA with business continuity, security, and operational needs in an ever more complex operating environment?” said Victor Janulaitis, CEO of Janco Associates.

To read this article in full, please click here

Read more

New MacBook Pros at work? Here's how to manage them right

Credit to Author: Ryan Faas| Date: Mon, 30 Jul 2018 02:59:00 -0700

Earlier this month, Apple unveiled its newest generation of MacBook Pros; all feature a significant bump in performance, a redesigned butterfly keyboard, the arrival of “Hey Siri” commands and a second generation of Apple’s T-series chips. The T2 chip works to improve performance and includes a Secure Enclave for encryption operations to secure the laptops and power Apple’s TouchID as well as the Touch Bar. (The T2 chip is already in Apple’s iMac Pro.)

To read this article in full, please click here

(Insider Story)

Read more

Feds move to secure mobile devices with machine learning, biometrics

Credit to Author: Lucas Mearian| Date: Tue, 06 Mar 2018 03:24:00 -0800

Amid the growing use of mobile devices for work by federal employees, U.S. defense and intelligence agencies are fast adopting biometrics and other alternative ways of  computers, smartphones and tablets, according to a new report.

More than 90% of federal agency IT officials in an online survey said their organizations provide secure mobile access for work-issued devices, but less than 20% support workers’ personal devices to access most agency systems. Forty percent of those same officials voiced concern about securing personal devices, according to the online survey of federal government IT and cybersecurity officials.

To read this article in full, please click here

Read more

Mobile app management is being driven by unmanaged devices

Credit to Author: Lucas Mearian| Date: Mon, 12 Feb 2018 03:08:00 -0800

The need to manage applications on unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile app management (MAM) software and services, according to a new Gartner report.

By 2021, 60% of mobile apps being used in the enterprise will rely on at least one app-level management control, whether on managed or unmanaged devices, Gartner’s Market Guide for Mobile Application Management said.

Unlike MAM tools that are part of a larger enterprise mobility management (EMM) suite, the use of stand-alone MAM licensing offers lower per-user cost and can be attractive for companies only requiring app management, Gartner said. For other firms, EMM provides the advantage of a single console and policy set.

To read this article in full, please click here

Read more

The best mobile threat defense is mobile threat detection

Credit to Author: Lucas Mearian| Date: Wed, 22 Nov 2017 03:34:00 -0800

As enterprises push ahead with mobile-first strategies – and employee smartphones and tablets increasingly becoming business tools – the importance of mobile threat defense (MTD) is growing.

Using mobile threat detection and defense, however, is no small task; the technology must cover applications, networks and device-level threats to iOS and Android phones and tablets to be effective.

“We talk about mobile threat defense, rather than detection – the reason being these solutions not only detect, but also can prevent and remediate threats,” said Dionisio Zumerle, research director for mobile security at Gartner.

The MTD market is growing in terms of adoption, and has started to attract attention from endpoint protection platform (EPP) vendors and in other related markets, according to a recent report from Gartner.

To read this article in full, please click here

Read more

MobileIron adds Apple security along with support for iOS 11

Credit to Author: Lucas Mearian| Date: Tue, 05 Sep 2017 21:04:00 -0700

Enterprise mobility management (EMM) software vendor MobileIron today announced its Apple release, aimed at the growing need for enterprises to provide IT managers with more robust management and security features for Macs.

While Windows and even Chrome-based laptops are already included in EMM consoles, macOS hardware has traditionally been treated as an outlier in the office, according to Nick McGuire, vice president of Enterprise Research at CCS Insight.

While MobileIron’s software suite already supported macOS for basic functions, including device configuration, millennials entering the workforce favor Apple’s line of laptops – driving the need for a unified endpoint management strategy that includes security and bulk licensing, according to Ojas Rege, MobileIron’s chief strategy officer.

To read this article in full or to leave a comment, please click here

Read more

Microsoft consolidates its mobile management tools under Azure

Credit to Author: Lucas Mearian| Date: Thu, 29 Jun 2017 13:31:00 -0700

Microsoft has consolidated its Enterprise Mobility + Security (EMS) suite of products under its Azure portal, combining its Intune mobile application management tools and its Azure Active Directory (AD) and Information Protection under a single console.

The move offers a unified admin experience aimed at bolstering enterprise mobility management efforts.

Microsoft introduced the EMS suite in March 2014, targeting businesses with strong mobile and cloud-first strategies.

To read this article in full or to leave a comment, please click here

Read more