Misc

Mobile computing for the midmarket

Thanks to mobile computing, gone are the days of desktop computers, land line phones and the daily commute to the office. Today's businesses, regardless of size, rely on highly productive employees who are equipped to do the job anywhere, anytime. For midmarket companies, that means spending IT dollars wisely on wireless LANs, laptops, cell phones and other mobile devices. The IT Management guide to mobile computing offers resources and advice for successfully investing, implementing and maintaining mobile computing devices in your midmarket company.

For free advice and resources on more IT and business topics, visit our main IT Management Guide section.

Table of contents

   Featured story
   Glossary
   Managing a mobile workforce
   Security issues
   Oldies, but goodies
   More resources

  Featured story Table of Contents

Encrypting mobile devices: A best practice no one uses
[Shamus McGillicuddy, News Writer]

Experts say encryption is the best way to protect sensitive data on laptops and other mobile devices. Most IT organizations say they know this. So why do so few companies actually do it?

"I'm concerned that a great number of companies are still not protecting their data," said John Girard, vice president and distinguished analyst at Stamford, Conn.-based Gartner Inc. "The sales of [encryption] products over the last number of years are still a small fraction of the laptops and mobile devices out there."

Credant Technologies Inc., an Addison, Texas-based vendor of mobile encryption technology, recently surveyed 426 IT professionals worldwide. Eight-eight percent said they know large amounts of sensitive data are sitting on their employees' mobile devices. Seventy-two percent said the best way to protect that data is through encryption. But only 20% said they have actually deployed encryption on those devices.

>> Read the full story

  Glossary Table of Contents

  Managing a mobile workforce Table of Contents

  Security issues Table of Contents

  Oldies, but goodies Table of Contents

  More resources Table of Contents

This was first published in November 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: