search

Sid Vandervinne

Recent Posts by Sid Vandervinne:

3 powerful benefits of enterprise mobility management

As more and more organisations journey through digital transformation to glean insights from intelligence to better meet customers’ needs, and enhance the work experience for employees, the benefits of enterprise mobility management become increasingly difficult to ignore.

Topics: Lifecycle

Why it’s time to get serious about IoT security

Back in March, at Mobile World Congress in Barcelona, we heard predictions of more than 25 billion IoT connections across the globe within the next 30 years. There seems to be nothing that can't be connected to the internet. But, without robust IoT security, the enterprise will be open to new risks.

Topics: Security

Use Telecom Expense Management to take the chore out of managing mobility costs

Fast growing remote workforces enabled by ever-expanding bandwidth, and more sophisticated mobile devices are simply the new normal of modern business. But, the benefits of the new normal of enterprise mobility also come with the challenges of managing rising costs, rapidly advancing technologies, and major security risk.

Topics: Lifecycle

EMM is more than just MDM.  Mobility management for modern enterprises.

As mobility permeates all aspects of business processes and transforms how companies operate, many firms are still playing catch-up in terms of updating their IT infrastructure to empower mobile users. With the mobile landscape becoming more complex and less secure, IT teams need to take control of devices as well as the business-related applications, content, and data living on them. In modern workplaces, core enterprise mobility management (EMM) components are now essential for providing this control.

Topics: Lifecycle

Big gap in mobile cybersecurity starting to hurt more firms

As the number of mobile cybersecurity incidents continues to increase, it’s clear many organisations are failing to protect their mobile assets, even though mobile devices are prone (and potentially more vulnerable) to many of the same attacks as other devices. In fact, mobile users are magnets for phishing attacks, malicious apps and rogue wireless hotspots.

Topics: Security