Protection for JavaScript-based Enterprise Apps

,

This week on the Life in the Mobile Enterprise (LiME) podcast, I interview Rob Friedman, SVP of Engineering at Apperian, on the new product advancement that leverages Arxan Application Protection for JavaScript to create enterprise apps that are self protecting and resilient to prevent hackers from reverse-engineering and tampering with the Javascript code, protecting valuable keys […]

Predictions for 2017 – Where is Enterprise Mobility Headed?

,

The new year is around the corner and as we look back at 2016 it was an exciting year for the enterprise mobility market, full of noteworthy developments that powered fascinating projects and signal more dynamic times ahead. 2016 Enterprise Mobility Trends Enterprises and organizations are building and deploying more apps for workers  – the mean number of enterprise apps […]

Mobile Security Expert Interview: Allen Storey from Intercede

,

This week on the Life in the Mobile Enterprise (LiME) podcast, I interview Allen Storey, Chief Product Officer at Intercede, a provider of digital identity and trusted application management. With 27 years in IT under his belt, 15 of which were in cyber security, Allen is an expert in the field who has seen security standards […]

BYOD Security – The Secure Approach to Supporting Employee Devices

,

This is the final blog post in a series providing guidance on rolling out and managing a successful Bring-Your-Own-Device (BYOD) program in your organization.  In the previous post in this series we talked about BYOD not being a strategy in itself. Allowing employees to use a device of their choice should be rolled out in […]

Best Practices for BYOD Policies and Programs

,

This is the second blog post in a series providing guidance on rolling out and managing a successful Bring-Your-Own-Device (BYOD) program in your organization.  Bring your own device (BYOD) by itself is not a strategy; it’s a decision on whether or not to support the device of choice of mobile users in your organization. Can […]

BYOD and the Employee: Choice, Benefits, and IoT Enablement

,

This is the first blog post in a series providing guidance on rolling out and managing a successful Bring-Your-Own-Device (BYOD) program in your organization.  BYOD and the Employee BYOD is no longer a trend, but a reality that most organizations are facing when it comes to supporting workers that want anytime, anywhere access to corporate […]

Mobile Expert Interview with Ionic Framework’s Ben Sperry and Adam Bradley

,

This week on the Life in the Mobile Enterprise (LiME) podcast, I interview co-founder, Ben Sperry, and lead developer, Adam Bradley, of the Ionic Framework, an open-source mobile framework. Ionic had enabled web developers to build over 2 million high quality mobile apps with the web technologies they are familiar with – HTML, CSS and JavaScript. Tune in […]

Tips from Bill Bendrot, Mobile Expert at Electronic Arts

,

This week on the Life in the Mobile Enterprise (LiME) podcast, I interview Bill Bendrot, Manager of Services and Mobile for the Employee Tools group at Electronic Arts. 18 months ago Bill was tasked with building an internal mobile development program from the ground up at EA. Today, it is one of the most innovative in the industry. […]

Identity Management, Single Sign On and App Federation

,

This week on the Life in the Mobile Enterprise (LiME) podcast, Chris Hazelton interviews Magnus Mjøsund, Product Manager at Apperian, on identity and access management. From everyday consumer usage, to controlling data access in highly regulated corporate or government environments, tune in to learn how identity management can and should be applied to your mobile deployments. Key Points: What […]

6 Guidelines to Creating a Secure Mobile App for Providers

,

Unlike apps targeted at consumers, provider-facing apps developed by health systems require a different skillset – and security considerations. Healthcare providers are creating – or thinking about creating – internal business apps to help clinicians improve patient care or streamline core processes, but they face challenges with privacy and security. After all, it’s not easy […]