5 Reasons Why Businesses Need To Look Seriously At BES 10

BES 10

Considering BlackBerry out of the game is like saying you won’t drink water out of your tap now knowing that Coke exists. If you are interested in securely managing data on your smartphones and tablets you should at least look at Blackberry Enterprise Service 10 (BES 10) and BlackBerry 10 (BB 10). While the competition is definitely popular, there is no question that the original is still best for business.

No question Android and Apple devices have come out with new sexy hardware, operating systems, apps and ecosystems of services. BlackBerry has had basically the same hardware, OS, and apps (actually even less apps than before) for several years now. One thing that has remained constant is that businesses love the management infrastructure and reliable security of BlackBerry.

We’ve  taken approximately 1,000 client calls in the past year asking how to manage Android and Apple devices in the same way you manage BlackBerrys. While there are definitely some slick solutions and products out there, none of them really measure up quite the same way.

What’s worse is that while all of these businesses are looking at MDM, they have been doing a lot more looking than buying. And every time RIM makes an announcement about the new BES 10 or (BB 10) devices, the calls slow down in anticipation of launch. Most of said launches either fell short or never happened at all.

I’ve had the pleasure of getting out to the RIM campus in Waterloo, Ontario over the last few weeks for a couple of deep dives into both BB 10 and BES 10. Here are the 5 reasons I think they’re both game changers. [Read more…]

Put Some ISE On Those BYOD Security Pains [Cisco]

Put Some ISE On Those BYOD Security Pains

There’s no denying it: employee-owned mobile devices, with frequent off-site network access, are the new normal for the next generation of workers.

Although adoption of BYOD programs is steadily climbing, security concerns for IT leaders continue to deepen. A 2012 Forrester survey of senior IT executives confirms security is their Number 1 concern regarding BYOD. And a 2012 Economist Intelligence Unit study cited corporate security as the biggest obstacle to implementing BYOD.

Making matters worse, yesterday’s mobile-access security solutions created in the past, no longer apply to today’s ubiquitous mobile-worker environments. There is simply too much complexity for legacy mobile device management (MDM) technology to deliver the functionality needed to protect corporate data and deliver the right user experience.

What companies need now is a security solution built with the challenges of today’s BYOD implementations in mind. This is where solutions such as Cisco’s Identity Services Engine (ISE) come into play.

Continue reading to get details on how Cisco is addressing this space, and find out more about a Mobility Webinar I’ll be hosting in December.

[Read more…]

Time Is Tight And Risks Are High – Which Is Why Endpoint Management Is So Critical [Tivoli]

With expansion happening faster than IT budgets are able to keep pace, the buzzword on everyone’s lips is “efficiency”. As an IT manager, your time and resources are in short supply. The BYOD revolution is creating huge challenges to your security strategy, your licensing considerations, and your server infrastructure. You need to know where the endpoints are and what vulnerabilities exist so when risks or gaps do occur, you can address them simply and efficiently.

Simply put, you need to know that your environment is secure and well managed.

With IBM’s Tivoli Endpoint Manager, three key issues are addressed:

[Read more…]