Posted by Yorgen Edholm on August 19, 2013
Does your management team have what it takes to lead and manage a mobile workforce? With all the talk about the mobile workforce, the conversation often revolves around employee requirements, productivity, and IT infrastructure needed to securely support remote workers. What isn’t discussed often enough, and should be, is how leaders’ management skills need to evolve to fit into our mobile-enabled world.
Posted by Accellion on August 15, 2013
The following is a guest post from Bill French founder and editor @iPadCTO.
Practical Guideposts for Producing Mobile Productivity Magic
The magical productivity that some businesses and enterprise workers experience with mobile devices is not determined solely by the device, nor can mobile software account for 100% of all mobile success.
Posted by Accellion on August 13, 2013
The widespread use of Microsoft SharePoint has made it a must-have tool for information and knowledge workers.
Posted by Jes Breslaw on July 30, 2013
I read an excellent article in The Register that, for me, was a leap forward in understanding the issue of data sovereignty. The author, Aaron Milne, makes the killer point that it doesn't matter who owns the data but "who has supreme power and authority over your data."
He asks the question:
Posted by Accellion on July 30, 2013
The following is a guest post from Ojas Rege, VP of Strategy @mobileiron. Accellion and MobileIron partner to provide enterprises with secure mobile device and content management.
Posted by Rama Kolappan on July 28, 2013
Studies show that most of us will lose a smartphone at least once this year. With employees using their own personal devices with free consumer grade apps for device sync, mobile file sharing, and public cloud back up, this can be a big problem for the enterprise. Interestingly, where the “oops” moment happens might depend on where you live according to a recent study.
Posted by Hormazd Romer on July 24, 2013
The top-secret National Security Administration (NSA) data mining program isn’t so secret anymore, and on Friday, July 18, it was reported by Reuters that the Foreign Intelligence Surveillance Court renewed authority for the United States’ Office of the Director of National Intelligence to collect telephony metadata in bulk.
Posted by Rama Kolappan on July 23, 2013
According to new research by Gartner, Inc. the days of the company-issued laptop may soon be gone. Based on findings from a global survey of CIOs, 38 percent of companies expect to stop providing workplace devices to staff by 2016 and that number will jump to 50 percent the following year. That means that BYOD will shift from optional to mainstream, with many organizations requiring employees to bring their own laptops, smartphones and/or tablets to work.
Posted by Rama Kolappan on June 18, 2013
Did you know that as smartphone use increases in a particular industry, the number of data breaches rise as well? Enterprises want their employees to use mobile devices, but the data security concerns can be overwhelming. How do enterprise IT departments enable secure mobile productivity amongst their workers?
Posted by Ryan Fahey on June 6, 2013
Guest Blog Post By: Ryan Fahey an Information Security Professional who is currently a security researcher at the Infosec Institute.
Mobile users be warned: the malicious malware attacks once focused exclusively on PCs have been redirected at mobile devices. From loopholes in operating systems, to poor mobile app coding, to an uptick in malware attacks, we’re seeing users fall prey to a variety of security issues. While the risks seem to be growing by the moment, here are the eight most common concerns right now: