Interop enterprise mobility: You are your mobile user's keeper

At the Interop New York 2010 conference, enterprise mobility strategies will be discussed.

At Interop New York there will be one harsh reality on the table: network managers can't keep personal mobile devices off of their networks. That means they need enterprise mobility security and policy strategies in a hurry.

"The days of giving a new employee a company-owned BlackBerry and an IT-controlled laptop and telling them they are good to go are quickly fading away," says Gartner analyst Paul Debeasi, who is speaking on the issue at Interop. "Increasingly, IT must learn to accommodate user requests to support employee-owned devices (smartphones, tablets, laptops) and social media (instant messaging, Facebook, blogging)."

The first step may be in designing enterprise mobility policy.

"IT must talk with their bosses about what user requests should be implemented, what it means to support a user/device/service, and what level of security risk is acceptable," Debeasi said.

At Interop New York, network managers will outline mobile security threats and look at products aimed at policy management and access control. They'll also discuss the impact of extending unified communications applications to personal mobile devices on the enterprise network.

NEXT: And speaking of wireless …


1 | 2 | 3 | 4 | 5 | 6 | 7 | NEXT

This was first published in October 2010

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: