Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors

Smartphones

We have searched the depths of our blog to provide you with the latest IT articles on Smartphones. Get Connected Today!

Pulling Out All the Stops:

Retailers Follow Customers into the Mobile World

by Jennifer Ramstrom | 11.18.16

With an estimated 80% of online adults using smartphones and 84% carrying them into stores, it’s not surprising that brick-and mortar retailers are adopting new ways to capitalize on the trend. Even if customers don’t make a smartphone purchase, the browsing they do on their phones often leads to a sale. Here’s a look at how today’s shoppers are using their smartphones and what savvy retailers are doing to accommodate them.

Tags:DesktopsMobile appsRetailRFIDSmartphonesSurveyTablets

Not Gone and Definitely Not Forgotten

Has the Death of Private Cloud Been Exaggerated?

by Kevin O'Connor | 10.21.16

It seems nobody is faster to predict imminent death than the IT industry. Tape, mainframes, disks, PCs, smartphones, and the Internet have all survived their obituaries—and now we can add private cloud to the list of technologies buried before their time.

“Private cloud is a concept propped up by legacy vendors desperate to provide enterprise IT groups a reason to keep buying their servers, storage, and network products—and that’s where the problem lies. It’s a solution in search of a problem. And not a very effective solution at that.”

Tags:Cloud Service ProvidersConnectionHardwareHybrid CloudITPrivate CloudSecuritySmartphonesSoftware

Security Threats to Mobile Devices

Hackers Swarm to Mobile Devices

Know Your Threats

by Stephen Nardone | 02.04.16

As IT struggles to get out in front of enterprise security risks, mobile devices are adding another wrinkle to defense plans as they become an increasingly active attack vector.

Not long ago, IT’s primary security mission was centered on locking down the desktop and creating a tight perimeter around the network to safeguard enterprise data assets. Then came the influx of smartphones and tablets and everything changed. Thanks to rise of the Bring Your Own Device (BYOD) movement, Gartner is predicting the primary endpoint breach to be tablets and smartphones by 2017, with the majority of transgressions tied to mobile application misconfiguration and misuse, not traditional technical attacks.

Tags:BYODGartnerITMalvertisingMDNMobile Device ManagementMobile devicesPassword ProtectionSecuritySmartphonesTablets

Mobile Data Security

Mobile Data: Information in Motion—and at Risk

Balancing Data Protection and User Productivity

by Stephen Nardone | 01.19.16

Today’s workers expect to access company information wherever and whenever they need it. Certainly, that improves your business’s efficiency and productivity. But it also exposes you to a gaping hole in security that can be difficult to patch. 

Tags:DevicesMDNMobile appsMobile Device ManagementMobilitySecuritySmartphonesTabletsWi-Fi

Mobile Security

The flood of smartphones, tablets, and phablets into the enterprise is creating all sorts of management headaches for IT—not just securing and tracking the physical devices, but also safeguarding the data and apps used as part of new mobile workflows. 

Tags:Internet of ThingsMDNMobile Device ManagementMobile devicesPhabletsSmartphones

Subscribe
Follow Us
RSS Feed
Featured Bloggers
Stephen Nardone - Director of Security Solutions and Services
Practice Director, Security and Mobility
Jennifer Ramstrom - VP Vertical Strategy and Business Development
VP Vertical Strategy & Business Development
Kevin O'Connor - Senior Director, Cloud Solutions Group
Senior Director, Cloud Solutions Group
Tag Cloud
Loading Loading...