6 Reasons to Adopt Enterprise App Stores

,

First there was BYOD (bring your own device) and now there’s BYOA (bring your own apps) — and both movements bring a level of uncertainty in terms of mobile security. Without dedicated enterprise app stores, it’s easy for companies and organizations to question applications downloaded by employees. The fact is; the mobile workforce is downloading from public […]

BYOD Network Performance during March Madness

,

As March Madness is set to go full throttle, millions of employees bringing their personal devices to work — courtesy of the bring your own device (BYOD) movement — will be streaming college basketball games in the workplace. This raises a number of security concerns for enterprise IT since many employees who look to use “free” streaming sites are […]

MAM: Key to Surviving the Unicorn Apocalypse?

,

In light of the latest “Unicorn Apocalypse” commercials from Samsung, we thought it would be interesting to look at what enterprise mobile management strategy works best in the case of a people-gobbling unicorn zombie attack. Obviously, we feel like enterprise mobile application management (MAM) is the best strategy – no matter whether you’re looking to […]

7 Best Practices for Mobile Application Security

,

Users are downloading mobile apps from numerous app stores – some of which may not be legitimate. These rogue apps might carry malware or otherwise negatively affect business data. Additionally, even applications developed in-house can pose security risks if they’re not coded correctly, according to an article in TechTarget. Here are 7 best practices enterprises […]

Applying MAM to the Top Mobile Security Threats

,

The use of mobile devices has helped to increase business efficiency by providing employees with the applications and data they need to do their jobs more effectively. Nevertheless, as employees increasingly use their personal mobile devices for different purposes and in a wide range of settings (work, home, shopping malls, other public venues), the use […]

Apperian in Wired Magazine: How the FTC’s Efforts to Protect Mobile Privacy Impact BYOD and MAM Programs

,

The regulatory arm of government continues to extend further and farther. The latest proposals involve the Federal Trade Commission (FTC), which is calling upon various players in the mobile marketplace to provide clearer mobile privacy disclosures to consumers. As Apperian’s Alan Murray points out in a recent article for Wired Magazine; the mobile privacy disclosure […]

Kiosks and Mobile Application Management: A New Revolution

,

Twenty minutes after educator, business owner, and author Jason Mark took his first iPad out of the box he was struck by the potential of the device to revolutionize the world of kiosks. And Mark’s right — self-service kiosks have already revolutionized any number industries from hotels to restaurants to airlines and retail. “Kiosks help […]

Enterprise Mobile Management: Applications or Devices?

,

Mobile application management (MAM) and mobile device management (MDM) are hot topics in the IT world for numerous reasons. But overall, these competing enterprise mobile management approaches share one common thread – who owns the device? Both enterprise mobility management systems offer their own benefits — however, we found that an MAM approach is well […]

Debunking BYOD Myths

,

When it comes to BYOD, there are a slew of myths and beliefs that simply aren’t true. Skeptics claim that enterprise leaders are railing against adopting BYOD programs and that employees themselves will waste valuable time noodling with their personal mobile devices on company time. Yet neither of these, or many other BYOD fables, are […]