Announcing Our Dynamic Policy Framework

,

Today we’re announcing the addition of our Dynamic Policy Framework to the Apperian EASE platform. This framework enables Apperian to build and provide a new generation of mobile application polices that can enhance the way an app operates – even after that app has been deployed on a mobile device. The dynamic aspect of these […]

When Should You Use Containerization for Enterprise Mobile Apps?

,

Containerization kind of reminds us of Brussels sprouts — it isn’t all that appealing, but it still has an occasional use. In the case of Brussels sprouts, if it were the last thing on Earth to eat, it might be an option. But in the case of containerization for enterprise mobile apps, we’ll explore what […]

Guarding Against the Legal Risks Associated with BYOD

,

Even though bring your own device (BYOD) has become a widely-adopted movement, many IT managers and business leaders still aren’t aware of the legal risks associated with information security and customer information accessed on employees’ personal mobile devices. As David Navetta, an attorney and founding partner of the Information Law Group notes in a recent TechRepublic […]

Achieving a Work-Life Balance with BYOD

,

Bring Your Own Device (BYOD) programs can offer companies appealing productivity gains and cost savings. For instance, a recent Trend Micro study of corporate decision-makers finds that promises of increased productivity is the chief factor driving BYOD initiatives. However, even though many business leaders express security concerns about allowing employees to store proprietary company and customer information […]

Addressing Enterprise Mobility and Continuity Challenges

,

The movement towards enterprise mobility as part of the growing BYOD (bring your own device) movement presents new challenges to business continuity planning (BCP) for IT and operations managers — including wider distribution of sensitive corporate and customer data on devices that aren’t owned by the company. As Tom Olzak notes in a recent article for […]

BYOD: Like the Mac, It’s Here to Stay

,

BYOD: the critics said it wouldn’t last — but, if you remember, that’s what the critics said about the Apple MacIntosh in 1984 – and most other Apple products since. And, we all know what happened with the Mac, the iMac, the iPod, the iPhone and the iPad. Same thing with BYOD — it’s here […]

BYOD? How About CYOD (Choose Your Own Device)?

,

Businesses have witnessed a dramatic evolution in mobile computing in recent years. Many organizations have transitioned from purchasing and managing mobile devices used by employees (or reimbursing employees after they bought a smartphone or tablet) to a state where staff now elects to bring their own device (BYOD) into the workplace. But what about choose […]

Making Bring Your Own Device (BYOD) Easier for IT

,

As employees continue to expand the definition of BYOD (bring your own device) in the workplace by toting laptops, Mac Minis and other devices into the workplace, companies will change the way they go about managing the mobile environment. According to a new report by Forrester Research entitled “2013 Forrester Mobile Security Predictions,” analyst Chenxi […]

The Four Principles of Mobile Application Management

,

As companies become more involved in the Bring Your Own Device (BYOD) movement and provide employees with enterprise mobile apps ranging from email to sales force automation to field service tools, IT and business leaders find themselves trying to determine the most effective approach for managing, monitoring, and securing corporate apps and data. The security […]

Tablets in the enterprise: latest insights into BYOD

,

Watch PCMag columnist Michael Miller debate with our very own Stephen Skidmore and bigtincan’s Andrew Berman on the future of managing an organization that allows employees to bring tablets from home. Video is from the TabTimes TABLET STRATEGY conference.