News:
@RonaldSchlager ranked #23 in Onalytica´s List "Unified Communications": Top 100 Influencers and Brands
Mobile Device Management Systems – Part 2

This article is part 2 of 2 and describes additional features of mobile device management solutions. The previous article covered the main objective of mobile device management systems and the typical building blocks. A few features were explained already.

Access to enterprise servers, applications, emails and data may be granted to authorized private devices (“Bring Your Own Device”, BYOD). Privately owned mobile devices may use certificate-based authentication.

(more…)

Read More

Mobile Device Management Systems – Part 1

This article (part 1 of 2) describes typical tasks of mobile device management system solutions you may look for.

Implementations of Mobile Device Management Systems

The solutions are provided as software systems running on corporate or provider specific server hardware, specialized appliances, virtualized services, may be offered as public cloud services of mobile operators or solution vendors or may be implemented as private cloud service.

(more…)

Read More

Risks of Insecure Mobile Devices – Part 2

This article (part 2) focuses on logical  risks and pitfalls of insecure mobile devices.

Malware

Malicious software is software like viruses, hidden spyware, phishing software, background software for monitoring or recording of user credentials, diallers to connect to premium calling services or software to send expensive premium SMS.

The measures to protect your device, your apps and data against malware for mobiles have to be the same as for personal computers or notebooks.

Untrusted Networks

Wireless Local Area Network (WLAN or Wi-Fi) technology uses radio…

Read More

Mobile Working and Mobile Living
Mobile Working

This article describes the advantages of mobile working and living and what can be mobilized.

(more…)

Read More