The Top 3 Questions Asked About Mac OS X Mavericks

The Top 3 Questions Asked About Mac OS X Mavericks

When Apple® introduced the new MacBook Pro® with Retina® display late in October, they also unveiled the latest version of Mac® OS X® operation system, Mavericks. With over 200 new features it quickly reached critical acclaim – especially considering the upgrade is free for users as far back as Snow Leopard.

Unbeknownst to the average user, Apple introduced a lot of new business features into Mac OS X Mavericks, which Apple has outlined in their new Mac in Enterprise Webinar series . In order to prepare our clients for the change, and understand the new features, Softchoice recently hosted a webinar. We asked clients to submit questions they have about Mac – and we discovered some interesting trends. Here are the top 3 questions we are routinely asked by clients regarding Mac OS X Mavericks.

[Read more…]

3 Surprising Ways the Mac Improves Enterprise Collaboration

3 Surprising Ways the Mac Improves Enterprise Collaboration

Gone are the days where employees blindly accept their corporate-issued PC. A Forrester report stated that many high-ranking employees prefer the Mac®, as “most of the Macs today are being freewheeled into the office by executives, top sales reps, and other workaholics.” This motivation goes beyond just wanting a pretty new machine, too. The report also suggests these Mac users are more productive than PC users – and earning 44% more money.

What does this have to do with IT? By not supporting the Mac – or doing the bare minimum to support them – you’re making life difficult for your executives and top performers.

Fortunately, things are changing, and it’s getting vastly easier to integrate the Mac into your environment so everyone benefits from a seamless collaboration experience.

We’ve found that there are three major surprises in store for our clients as we guide them through this process of integration.

[Read more…]

Security for Your BYOD Environment in 3 Simple Steps [Cisco]

BYOD is happening (like it or not): 3 basic steps you need to take

This post is for IT folks who would like to understand the minimum steps required to secure their network in an age where so many devices are attempting to connect to your network. An earlier post looked at developing policies for a formal BYOD program – this post is more about securing your environment (with or without a formal BYOD program). It covers employee’s personally owned devices that they bring to work with them, as well as visitors who are looking for a connection to the internet through your network.

It is possible to manage risk in your current BYOD situation today. Here are some tips and technology tools that take care of your existing BYOD needs now, even if your important BYOD policy plans aren’t quite polished yet. [Read more…]