search

Sid Vandervinne

Recent Posts by Sid Vandervinne:

Getting workplace flexibility right using end-user personas

The nature of work continues to evolve. Advances in mobile technologies and devices have ushered in a new world of workplace flexibility, enabling more and more workers to do their jobs from anywhere, at any time of day.

Topics: Management Intelligence Lifecycle

3 powerful benefits of enterprise mobility management

As more and more organisations journey through digital transformation to glean insights from intelligence to better meet customers’ needs, and enhance the work experience for employees, the benefits of enterprise mobility management become increasingly difficult to ignore.

Topics: Lifecycle

Why it’s time to get serious about IoT security

Back in March, at Mobile World Congress in Barcelona, we heard predictions of more than 25 billion IoT connections across the globe within the next 30 years. There seems to be nothing that can't be connected to the internet. But, without robust IoT security, the enterprise will be open to new risks.

Topics: Security

EMM is more than just MDM.  Mobility management for modern enterprises.

As mobility permeates all aspects of business processes and transforms how companies operate, many firms are still playing catch-up in terms of updating their IT infrastructure to empower mobile users. With the mobile landscape becoming more complex and less secure, IT teams need to take control of devices as well as the business-related applications, content, and data living on them. In modern workplaces, core enterprise mobility management (EMM) components are now essential for providing this control.

Topics: Lifecycle

Big gap in mobile cybersecurity starting to hurt more firms

As the number of mobile cybersecurity incidents continues to increase, it’s clear many organisations are failing to protect their mobile assets, even though mobile devices are prone (and potentially more vulnerable) to many of the same attacks as other devices. In fact, mobile users are magnets for phishing attacks, malicious apps and rogue wireless hotspots.

Topics: Security