Making Sense of Mobile Life Cycle Management

Continued from page 2

Network Management. To support the remote employee and reduce data costs, companies can improve end-user access to corporate networks in a secure fashion through the use of virtual private networks (VPN) and protected WPA2 Wi-Fi access. Although these security precautions are not new, companies must be sure that any devices supported for business services can access appropriate networks. Traditional VPN vendors and Wi-Fi security vendors must be considered in a full mobile life cycle management strategy even though the vast majority of these vendors do not have strong offerings in the rest of the life cycle.

Virtualization. As BYOD has become more popular, a newer approach is to support “dual persona" devices where one area of the device provides either sandboxed or virtualized access to the enterprise. These tools separate corporate applications, data and documents from personal mobile assets, which reduces compliance concerns. Good Technology, Citrix and VMWare are the best known players for dual personae.

Hyoun Park is a principal analyst at Nucleus Research where he oversees primary research on analytics, big data, business analytics, social software and enterprise mobility.



Hear more from Nucleus Research's Hyoun Park in the session, "Delivering Mobile Life Cycle Management," at the Channel Partners Conference & Expo, Feb. 27-March 1, in Las Vegas.

« Previous123Next »
comments powered by Disqus