Debunking the Six Myths of App Wrapping

,
myths of app wrapping

As organizational leaders increasingly recognize the value of deploying and adopting mobile applications, a critical decision they eventually need to make is determining the most effective approach (or mix of approaches) to deploy, secure, and manage mobile apps such as mobile application management (MAM®) and enterprise mobility management (EMM). Among these choices—as Gartner points out […]

How to Avoid Wasting Money on Enterprise Mobile Apps

,

Enterprise mobile apps can drive heightened employee productivity by enabling workers to get work done wherever and whenever they’re able to. But mobile apps will only generate payback if there’s a clear business case for their deployment and they’re actually used by mobile workers. To help drive mobile app adoption in the enterprise – and, […]

Linux Containers for App Security

,
linux containers for app security

A major focus in security is preventing system intrusion resulting from vulnerabilities in the software running on it. However an equally important consideration is mitigation and isolation – if an attacker is successfully able to compromise a single node in a system, how do you prevent the attack from spreading? Isolating a complex system into […]

How Will You Distribute That Enterprise Mobile App You’re Developing?

,
distributing enterprise mobile apps

Many companies are opting to develop their own custom enterprise mobile apps for employees, contractors, business partners, and even customers to use. Often, the primary driver for building custom apps is ensuring that target users are provided with the specific features, functionality, and access to data that’s required in their roles. For many organizations, the initial […]

Apperian Enables a New, Highly-Secure Tablet with IBM, Secusmart and Samsung

,
secusmart secutablet

We’re really excited to see that this weekend’s unveiling of the highly secured tablet, SecuTABLET at CeBIT is gaining so much attention! The solution, which was made possible through our partnership with IBM and Secusmart (a Blackberry subsidiary focused on digital security), was described on Bloomberg as being able to “spy-proof” Samsung tablets. The SecuTABLET is a […]

Mobility for the Extended Enterprise

,
mobility for the extended enterprise

When organizational leaders think about enterprise mobile apps, they often focus on the potential productivity benefits that are directly generated from employee usage. But in reality, today’s extended enterprise is highly distributed. Work teams across various geographies, business partners, contract workers, franchisees, field staff, and dealers are often using the same apps that employees use—offering […]

Recap: Boston Higher Ed Mobility Professional Meetup

,
mobility professionals

Tufts University explained that 90% of students access university resources via a mobile device, clearly justifying the need for mobility within higher ed. With impressive attendance from some of the top higher education institutions in the Boston area, including Brandeis, Harvard, Simmons and Boston University, this morning’s Higher Ed Mobility Professional Meetup resulted in a lively […]

Enterprise Mobility 4.0: Reaching the Extended Enterprise

,
enterprise mobility for extended workforce

Enterprise mobility has progressed dramatically in recent years. What started as basic email and calendar applications quickly evolved into enterprise mobility 2.0: internal web apps with the ability to sync and share data on corporate-owned devices. Not far behind v2.0 was v3.0: custom applications with the ability to support business process end-to-end on employee-owned devices. […]

How Effective BYOD Policies Can Help Limit Legal Exposure

,
byod legal issues

In and of themselves, BYOD programs don’t pose legal issues to companies that use them. However, when employees circumvent organizational security protocols to access work-related systems—such as policies against accessing insecure public WiFi networks—this exposes the organization to uncontrolled levels of risk, as do other aspects of connectivity to systems that contain sensitive corporate and […]