Apple’s Volume Purchase Program better enables Enterprise Mobility in iOS 7
Author: MobileIron In iOS 7, the Apple Volume Purchase Program goes in new directions that greatly benefit organisations, making apps easier to distribute and licenses easier to control. With the...
View ArticleCloud storage services: Are you saying yes?
Author: COMPUTERLINKS When you work in security it’s easy to sometimes have a default “no” setting. Especially when it comes to things that we don’t know enough about or even worse fear we may not be...
View ArticleMobile Security Threats – How aware is your business?
Author: Billy Austin, President & Co-Founder, iScan Online, Inc. We live in a world of branch offices, remote workers, BYOD, transient and mobile users. Today’s wide array of smartphones, tablets...
View ArticleThe Lessons of the BlackBerry Decade
Author: Ojas Rege, MobileIron. BlackBerry changed the world. It made wireless email a killer app that every salesperson and travelling executive absolutely needed to have to get their work done. It...
View ArticleThe Evolution of Secure MDM and the Mobile Workspace
Author: Emmet Cleere, Pre-Sales Consultant, COMPUTERLINKS We are seeing the writing on the wall quite clearly. Mobility and the Mobile Workspace are the way forward. Who wouldn’t want their employees...
View ArticleA Winter Olympic Games Online Safety Guide
Author: Trend Micro For all you sports fans out there February is going to be a great month, with the XXII Winter Olympic Games. It’ll be one of the most watched sporting tournaments of 2014, but like...
View ArticleManaging the Mobile Workforce
Author: Oliver Chapman, Internal Sales, COMPUTERLINKS. With the increasing popularity of smartphones and tablets, it was only a matter of time before these devices filtered through into the working...
View ArticleThe building blocks for an enterprise mobility strategy
Author: David Ellis, Director of Strategy, Arrow ECS UK. Back in August last year I posted a short blog on how BYOD was a catalyst for enterprise mobility. Since then mobile access has become...
View ArticleChallenging the Paradoxes of Online Privacy
Author: Bob Griffin, Chief Security Architect, RSA EMC has just announced the results of research into the attitudes of consumers around the world towards privacy, particularly in terms of the often...
View ArticleBad guys are watching you (via insecure Wi-Fi)
Author: Kaspersky Recent developments in the smartphone world and the emergence of mobile apps for almost every use have inevitably led to increased smartphone and tablet usage when dealing with...
View ArticleHow to Build a Winning Digital Strategy – look in the mirror
Author: Denise Bryant, Director of Sales, Arrow ECS. One of the key challenges for businesses looking to exploit the huge opportunity that digital platforms provide us with today is how to link social...
View ArticleConvoi by Citrix: Free Cloud-Based Communication Simplified
Author: Carey Caulfield, Citrix. Today, we’re excited to bring you a simple cloud-based business phone. With the free Convoi app, you can separate personal and business calls, texts and voicemails by...
View ArticleSecuring the Internet of Things Revolution
Author: Dr. Mallik Tatipamula, VP, Service Provider and Cloud Solutions, F5 introduces one of the main themes that F5 will be talking about on 2-5 March at Mobile World Congress 2015. Addressing...
View Article
More Pages to Explore .....