Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
ITSM tools enter the consumerization era
BMC's MyIT app aims to bridge the gap between traditional ITSM tools and today's empowered, mobile end users. Continue Reading
How to develop a monitoring system for mobile cloud-based applications
If your mobile workforce uses cloud-based applications to work from their smartphones and tablets, consider a monitoring system to ensure the apps are working. Continue Reading
Web apps easier for IT to secure, but BYOD users go native
BYOD shops deal with constant push and pull and the tension increases when it comes to Web apps vs. native apps. Users like native apps, but IT can’t seem to secure them. Continue Reading
-
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT. Continue Reading
Cius vs. iPad: Can Cisco take on Apple?
The battle for the enterprise tablet may boil down to Cisco vs. Apple and Cius vs. iPad. However, Fast Packet blogger, Greg Ferro wonders if Cisco really has the engineering and apps to win. Continue Reading
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.Continue Reading
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide...Continue Reading
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy.Continue Reading