News:
@RonaldSchlager ranked #23 in Onalytica´s List "Unified Communications": Top 100 Influencers and Brands
What is ‘Mobile Expense Management’?
pixabay.com NikolayF

What is ‘Mobile Expense Management’?

In general, Mobile Expense Management is one piece of a puzzle of a complex solution called Enterprise Mobility Management. These solutions additionally consist of elements to manage devices, apps, data, security, users and content. Telecom Expense Management solutions supplement Mobile Expense Management and may be integrated into the same system.

(more…)

Read More

Mobile Device Management Systems – Part 2

This article is part 2 of 2 and describes additional features of mobile device management solutions. The previous article covered the main objective of mobile device management systems and the typical building blocks. A few features were explained already.

Access to enterprise servers, applications, emails and data may be granted to authorized private devices (“Bring Your Own Device”, BYOD). Privately owned mobile devices may use certificate-based authentication.

(more…)

Read More

Mobile Device Management Systems – Part 1

This article (part 1 of 2) describes typical tasks of mobile device management system solutions you may look for.

Implementations of Mobile Device Management Systems

The solutions are provided as software systems running on corporate or provider specific server hardware, specialized appliances, virtualized services, may be offered as public cloud services of mobile operators or solution vendors or may be implemented as private cloud service.

(more…)

Read More

Whose Job is Mobile Security?

This article discusses the responsibility for mobile security from an independent view.

Mobile users like you and me

We are responsible for our privately owned mobile devices. For corporate owned devices we still have some responsibility. We handle the device, use apps and corporate data at different locations. As a first step we have to take care of physical and logical security.

If your IT department offers some security guidelines read them carefully. Be aware of legal consequences for users ignoring their…

Read More