Making Sense of Mobile Life Cycle Management
January 04, 2013 - Article
Continued from page 2

Network Management. To support the remote employee and reduce data costs, companies can improve end-user access to corporate networks in a secure fashion through the use of virtual private networks (VPN) and protected WPA2 Wi-Fi access. Although these security precautions are not new, companies must be sure that any devices supported for business services can access appropriate networks. Traditional VPN vendors and Wi-Fi security vendors must be considered in a full mobile life cycle management strategy even though the vast majority of these vendors do not have strong offerings in the rest of the life cycle.

Virtualization. As BYOD has become more popular, a newer approach is to support “dual persona" devices where one area of the device provides either sandboxed or virtualized access to the enterprise. These tools separate corporate applications, data and documents from personal mobile assets, which reduces compliance concerns. Good Technology, Citrix and VMWare are the best known players for dual personae.

Hyoun Park is a principal analyst at Nucleus Research where he oversees primary research on analytics, big data, business analytics, social software and enterprise mobility.



Hear more from Nucleus Research's Hyoun Park in the session, "Delivering Mobile Life Cycle Management," at the Channel Partners Conference & Expo, Feb. 27-March 1, in Las Vegas.

« Previous123Next »
comments powered by Disqus
Related News
The Visage platform integrates with Concur.
TBI, the master agent and tech distributor, has a new, exclusive deal with Teligistics that allows
Craig Galbraith
A comprehensive suite of mobile solutions from AT&T and SAP should be available to AT&T
Daniel Santa Cruz
BES 10 is a consolidation of BlackBerry's enterprise mobility management portfolio, which includes