Posted by Gemma Randazzo
Whether you feel that BYOD is here to stay or if you feel it’s a passing trend with a hot buzzword, the reality is that employees are using their own personal devices in the work place more and more. The bigger reality is that not all of those devices have been approved by corporate IT and therefore policies aren’t in place to keep critical data on those devices safe. In a survey by AirTight Networks 37% of people interviewed said that iPads, iPhones and Android devices were sanctioned technology in their environment. Of those same people surveyed 47% said their organizations supported applications that users were accessing. Not too bad. But when further interviewed a whopping 69% said they were concerned that employees were using mobile hotspots to bypass corporate policies and were concerned about the security of data being transmitted.
With the sheer proliferation of smart devices it isn’t hard to deduce that there are a great many people who have just added their company email to their iPhone quickly and easily and didn’t give it a second thought that these devices weren’t sanctioned or a cause for concern. Checking personal and work email on the go is common for the average employee (and with the iPhone for example you can conveniently get both with one tap). So where do organizations go? Can you force an employee to turn over their personal devices when they pay the bill? What if they pay half the bill and the company picks up the other half? As a corporate IT department can you mandate that job security is directly correlated to use of a smart device? The latter is of course extreme but when confidential information is being accessed on an employee’s personal device the loss of that device could significantly hurt an employer.
A “hope for the best” attitude isn’t proactive either. That “hope for the best” attitude was what 22% of those surveyed responded with – hopefully it isn’t an organization that stores medical information or defense information. So what can an organization do? Educating employees and communicating with employees seems elementary but makes sense. Depending on your business simply asking employees to password protect access to their smart phones is a pretty easy route to take and for those organizations who know sensitive information is being access by employees, a mobile device management software solution really eliminates risks. When BYOD’s are treated like the rest of your ruggedized devices and peripherals it makes BYOD a lot less scary.
Whether it’s a lasting trend or simply a blip until the next greatest invention, airing on the side of caution means either way your data is protected.
Posted by Brandon Hill
The post below comes from Ashley Furness of Software Advice, discussing her recent research on “Strategies to Secure Your Enterprise in the New World of BYOD.” Hope you enjoy it!
“Hello everyone! My name is Ashley Furness and I am a marketing analyst for research firm Software Advice. I cover emerging trends in CRM, sales, marketing and help desk solutions, such as Wavelink’s Avalanche and Avalanche Remote Control. I’d like to share some research I recently completed on tips for your help desk to combat BYOD-created risks. While this list should not be considered all-encompassing, it should serve as a good starting point.
Bring Your Own Device (BYOD) policies–or allowing employees to use personal laptops, tablets and smartphones for work-related tasks–benefits employers and users in compelling ways. Workers get to use the device they are most comfortable with, and employers reap increased productivity benefits.
But sensitive corporate data is very likely vulnerable to theft on employee-owned mobile devices.
I am pleased to announce that today we released Wavelink Velocity, our next-generation industrial-grade browser. With Velocity, customers can easily and securely deploy their mission-critical web-based applications to all their mobile workers with connection persistence and rich and consistent HTML rendering, across mobile ecosystem.
What is Velocity?
Velocity is engineered to address key traditional browser shortcomings such as poor performance, connection interruptions, lack of scanner support and narrow OS platform support. It also introduces a new set of features to enhance web application performance. With industry-leading performance and connection persistence, Velocity is built to overcome traditional browser difficulties and limitations and performs in the most challenging environments. Velocity is designed for scanning intensive applications and is optimized for mobile workers.
How does Velocity work?
Velocity is a server-side web browser paired with a client-side viewing application. The Velocity server interacts with a web server and performs most of the browser functions. It processes the pages using a browser engine and then sends it to the client in a lightweight format. Users receive all the benefits of a fast browser without waiting for the processing to take place on the client.
Posted by Brandon Hill
It used to be that to buy something the consumer would just walk up to the cashier to get the items scanned and then pay. With the rise of mobile it’s becoming more common for the cashier to be roaming the store in search of a customer ready to check out all in the name of streamlining the customer’s experience.
Last holiday season Urban Outfitters used more than 300 iPod Touch devices as point-of-sale (POS) systems, and anticipates in the future that 80 percent of Urban Outfitter staffers will carry them to help with transactions.
While the emergence of mobile devices as POS systems creates convenience for shoppers and employees as well as less costs going into cash register acquisitions, it spells a problem in the form of managing the devices.
Earlier this year, beauty product retailer Sephora followed Apple’s lead by ditching its traditional POSes in favor of iPod Touches. With a list of retailers implementing pilots in an effort to reduce customer wait times the worry is if those devices need to be managed, and how is that going to be done?
The trend of mobile devices replacing cash registers isn’t going to slow down anytime soon, especially if you believe Square’s report of their volume last year. Mobile Payments Today published an infographic (also posted below) centered on mobile payments and stated that a mobile device as a credit card processor as one of the second-most hyped forms of mobile payments.
Companies need to make sure a policy is in place to manage all these devices and a central location to wipe them if they turn up missing.
Compliments of MobilePaymentsToday.com
Posted by Don Osburn
I participated in a discussion of the Enterprise Mobility Group on LinkedIn (which you can link to from our discussion on our own board). It’s addressed towards CIOs, and centers around the growth of Mobile Application Management and it’s impact on Mobile Device Management. Reviewing those comments, and observing the explosive growth of LinkedIn groups targeted at “Enterprise Mobility”, I got thinking about something I’ve noticed for quite a while.
The market specialists have always seemed very confused when it comes to device management (MDM), mobile application development, and many other areas of mobility. There has always been a tendency to lump multiple technologies together when they really should not be connected. As one example, there has been a tendency for years for media publications to lump “cell phone management” in as part of MDM. Cellular carriers and their channel have always had their own management issues. However, they’re not the same issues a WMS manager has controlling barcode scanners, mobile printers, etc. Yet most industry reports (until very recently), have tended to lump cellular phones, and a whole host of other devices all together when talking “MDM”.
We are excited to share our Speakeasy and Goya Foods video case study. Luis and his team are doing amazing things with their applications, and this video has some excellent insight into the ways voice-enabling their Manhattan Associates WMS has really improved operations. Take a peek and let us know what you think!
You can view all of our videos at our YouTube page, here.
Posted by Brandon Hill
Anyone who has used a rugged mobile device knows how valuable the devices are to any enterprise. Their efficiency and speed make them one of the keys to retail and warehouse business processes. But, does your organization have a solid mobile enterprise application platform (MEAP) to make mobile applications and workers as productive as possible?
According to a SearchConsumerization article written by Michael Brandenburg, “Mobile enterprise application platforms provide an environment where enterprises can develop an application once and run it on any mobile OS. This approach is essential to enterprises that support a mix of devices, especially those that allow end users to run mobile enterprise applications on personal devices.”
Velocity was built to do exactly that, and is built and optimized for ruggedized mobile devices where traditional browsers are not. In the past, enterprises were forced to run Web applications across a variety of different versions of Windows, Pocket IE, etc. This led to inconsistent and unreliable user experience. Velocity stabilizes user experience regarding this issue.
As more and more companies see the value in moving toward web applications, it’s critical that they have a browser that is capable of meeting new needs and requirements. If your organization is looking at moving towards browser-based applications, it’s important to remember a few things: 1) Ensure that the application will be rendered properly across many different device types/sizes. 2) Will it work across multi-OS platforms, common in the rugged space? 3) Will connection be maintained if the device moves in and out of RF coverage?
Make sure you know the answers to these questions, and if you feel we’ve missed any, feel free to post them in the comments below.
The Voice market is changing. The traditional, legacy, providers are seeing the market expand and enterprises are finding that adding voice to their web applications no longer requires being held “hostage.” With long implementation cycles, costly brand-new hardware and extensive training, enterprises are shelling out big money to add Voice. This begs the question; when does ROI actually kick in? Isn’t Voice supposed to streamline operations, therefore saving you money?
It isn’t to say that these traditional providers don’t eventually save organizations money, but with tight budgets and staff often wearing multiple hats it is even more important for enterprises to see an early return, not only on the financial side, but also on the implementation side.
At our “Voice in 30 Days!” webinar, we talked about many of these topics, and how Speakeasy answers these challenges. For enterprises adding Voice just got a whole lot simpler.
Don’t have the resources or time to dedicate to a Speakeasy implementation? At the webinar, we announced the new Speakeasy Professional Services team that is available to get voice applications up and running as fast as possible. Our highly qualified group of field implementation engineers serves as an extension to your organization by ensuring that your specific objectives are met and that Speakeasy is deployed correctly. Additionally, with close relationships with strategic WMS providers and support for enterprise applications such as SAP and Oracle mean customers who were once limited to voice options, now – so to say – have a voice! We’d love to hear your voice success stories in the comments below!