Wavelink Blog

Tag: MDM strategies

Who Owns Mobile?

The National Retail Federation (NRF) recently penned the question “Who owns mobile in your company? Does it reside with your e-commerce team? Does it fall within marketing? Perhaps IT? Or is it a team made up of representatives from across the organization?” As Vicki Cantrell states it is a “mobile conundrum” and its impacting your brand.

At LANDesk and Wavelink, we spend a lot of time discussing this mobile conundrum and where the responsibility for it falls. The reality is today it isn’t just a one department answer. Today’s instant gratification, super cool technology is evolving quicker than a business knows what to do with it. They just know they have to keep up, and it’s no clearer than where the average consumer spends the majority of their time – the retail space. Retail defines cool, and it’s where slick marketing and graphics can create such buzz that every high school kid wants to dress like an Abercrombie model. On the flip side, it’s also where negative buzz and press can create a backlash so that those same kids then decide they don’t want to wear Abercrombie because the Situation said so. You have to stay on-trend, or run the risk of hurting your brand.

(more…)

Cutting to the Chase: Let’s Talk MDM

Everyday, I see updates and conversations on various sites and forums about MDM/BYOD/etc. Many are from LinkedIn forums, which usually contain some initially good discussions, before they turn into sales pitches for various providers. Nowadays, with all of the buzzwords surrounding the enterprise mobility space, it’s hard to weed through the murky stuff, and get to the bottom of what’s important about MDM: defining your mobile ecosystem.

Until your mobile ecosystem is defined, it’s hard to determine what the needs are, and ultimately, will delay your return on investment. As we’ve discussed in the past with many BYOD topics, it’s important to have a clear plan on what your unique needs are in the enterprise. What’s the landscape of devices like? Do you have all rugged devices, or do you also have smart devices you need to manage? What about network infrastructure? Do you need to manage the wireless access points in addition to the devices? Do you have one, or many locations you’ll need to have insight over?

The point is that every mobile ecosystem is different, and take caution when doing your research, as to not get caught up in the buzz and spin. The truth is that very few enterprises are alike, and being able to work with a trusted advisor to determine the best plan of action will lead to quicker implementation, faster ROI, and a more efficient enterprise.

As a side note, if you would like to join a LinkedIn group that avoids the jargon, we’re looking to get a solid group who are interested in discussing topics, not sales pitches, in our Mobile Ecosystem group. Check it out, and strike up a conversation!

BYOD Security in the Mobile Ecosystem

I was speaking with Kelly Ungs yesterday and he pointed me towards an interesting article over at the EMF.org about BYOD. The article makes a point about some of the liabilities around BYOD policies, and I thought it was worth sharing.

The article specifically references the recent info about IBM’s struggles with BYOD policies, and something jumped out at me that continues to be an issue in the BYOD space – security. The issue, of course, being that employee’s usually don’t mean to introduce risks into the enterprise, but sometimes do simply out of pure, accidental error.

“We found a tremendous lack of awareness as to what constitutes a risk,” says {Jeanette} Horan. So now, she says, “we’re trying to make people aware.”

Security is a huge issue, and it’s important that companies take it into consideration, regardless of it being tied to a BYOD policy or not. Further, it’s also important that companies can secure the network(s) that these devices are connecting to. Remember, it’s not just the information on the device that’s at risk. It’s also the information the device can tap into. Remember that factor, and check out the articles above. Let us know what you think about security and BYOD in the comments below, or start a new discussion in our LinkedIn group.