+++ @RonaldSchlager ranked #27 in Mio's "Unified Comms Influencers: The Top 50 for 2019 Revealed" +++ @RonaldSchlager ranked #23 in Onalytica´s List "Unified Communications": Top 100 Influencers and Brands for 2016 +++
Mobile Device Management Systems – Part 1

This article (part 1 of 2) describes typical tasks of mobile device management system solutions you may look for.

Implementations of Mobile Device Management Systems

The solutions are provided as software systems running on corporate or provider specific server hardware, specialized appliances, virtualized services, may be offered as public cloud services of mobile operators or solution vendors or may be implemented as private cloud service.


Read More

Whose Job is Mobile Security?

This article discusses the responsibility for mobile security from an independent view.

Mobile users like you and me

We are responsible for our privately owned mobile devices. For corporate owned devices we still have some responsibility. We handle the device, use apps and corporate data at different locations. As a first step we have to take care of physical and logical security.

If your IT department offers some security guidelines read them carefully. Be aware of legal consequences for users ignoring their…

Read More

Protect Your Mobile Device – Part 4

This is the last article explaining logical measures every user may take to protect his mobile device.

Protect your Data

The best protection for your data in memory is not to store any of them in your mobile device.

The second choice is encryption. Encryption helps to protect your stored data. You may either encrypt all files in memory or only selected files. Your emails may be protected as well. Some operating systems have these functions already built-in. Depending on the operating…

Read More

Protect Your Mobile Device – Part 3

This is the third of four articles explaining logical measures every user may take to protect his mobile device.

Trusted and Untrusted Apps

Apps installed on your mobile device make it a unique system tailored to your specific needs. Download apps from well-known app stores and install apps you may trust. Be careful when you are asked to set permissions of an app to be installed.

Your corporation may define black lists you should not use or white lists of apps you should…

Read More

Protect Your Mobile Device – Part 2

This is the second of four articles explaining logical measures every user may take to protect his mobile device.

Use only Trusted Devices

As soon as your device is cracked certain apps have no restrictions and do what the developers have implemented. Be aware that your data may get lost or stolen and there is no protection or confidentially at all. Don’t use such devices for services requiring some kind of security like mobile banking, mobile payments, shopping, credit card payments and others….

Read More