Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Mobile computing for the midmarket

The IT Management guide to mobile computing offers resources and advice for successfully investing, implementing and maintaining mobile computing devices in your midmarket company.

Thanks to mobile computing, gone are the days of desktop computers, land line phones and the daily commute to the office. Today's businesses, regardless of size, rely on highly productive employees who are equipped to do the job anywhere, anytime. For midmarket companies, that means spending IT dollars wisely on wireless LANs, laptops, cell phones and other mobile devices. The IT Management guide to mobile computing offers resources and advice for successfully investing, implementing and maintaining mobile computing devices in your midmarket company.

For free advice and resources on more IT and business topics, visit our main IT Management Guide section.

Table of contents

   Featured story
   Glossary
   Managing a mobile workforce
   Security issues
   Oldies, but goodies
   More resources

  Featured story  Table of Contents

Encrypting mobile devices: A best practice no one uses
[Shamus McGillicuddy, News Writer]

Experts say encryption is the best way to protect sensitive data on laptops and other mobile devices. Most IT organizations say they know this. So why do so few companies actually do it?

"I'm concerned that a great number of companies are still not protecting their data," said John Girard, vice president and distinguished analyst at Stamford, Conn.-based Gartner Inc. "The sales of [encryption] products over the last number of years are still a small fraction of the laptops and mobile devices out there."

Credant Technologies Inc., an Addison, Texas-based vendor of mobile encryption technology, recently surveyed 426 IT professionals worldwide. Eight-eight percent said they know large amounts of sensitive data are sitting on their employees' mobile devices. Seventy-two percent said the best way to protect that data is through encryption. But only 20% said they have actually deployed encryption on those devices.

>> Read the full story

  Glossary  Table of Contents

  Managing a mobile workforce  Table of Contents

  Security issues  Table of Contents

  Oldies, but goodies  Table of Contents

  More resources  Table of Contents
This was last published in November 2006

Dig Deeper on Small-business IT strategy

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close