Mobile computing for the midmarket
The IT Management guide to mobile computing offers resources and advice for successfully investing, implementing and maintaining mobile computing devices in your midmarket company.
Thanks to mobile computing, gone are the days of desktop computers, land line phones and the daily commute to the office. Today's businesses, regardless of size, rely on highly productive employees who are equipped to do the job anywhere, anytime. For midmarket companies, that means spending IT dollars wisely on wireless LANs, laptops, cell phones and other mobile devices. The IT Management guide to mobile computing offers resources and advice for successfully investing, implementing and maintaining mobile computing devices in your midmarket company.



What should be in a CIO’s IT strategic plan?
This complimentary document comprehensively details the elements of a strategic IT plan that are common across the board – from identifying technology gaps and risks to allocating IT resources and capabilities. The SearchCIO.com team has compiled its most effective, most objective, most valued feedback into this single document that’s guaranteed to help you better select, manage, and track IT projects for superior service delivery.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
For free advice and resources on more IT and business topics, visit our main IT Management Guide section.
Table of contents






Featured story | Table of Contents |
Encrypting mobile devices: A best practice no one uses
[Shamus McGillicuddy, News Writer]
Experts say encryption is the best way to protect sensitive data on laptops and other mobile devices. Most IT organizations say they know this. So why do so few companies actually do it?
"I'm concerned that a great number of companies are still not protecting their data," said John Girard, vice president and distinguished analyst at Stamford, Conn.-based Gartner Inc. "The sales of [encryption] products over the last number of years are still a small fraction of the laptops and mobile devices out there."
Credant Technologies Inc., an Addison, Texas-based vendor of mobile encryption technology, recently surveyed 426 IT professionals worldwide. Eight-eight percent said they know large amounts of sensitive data are sitting on their employees' mobile devices. Seventy-two percent said the best way to protect that data is through encryption. But only 20% said they have actually deployed encryption on those devices.
Glossary | Table of Contents |
- Definition: Wireless
(Source: SearchMobileComputing.com, powered by WhatIs.com) - Definition: Wireless LAN (WLAN)
(Source: Search.com, powered by WhatIs.com) - Definition: 802.11
(Source: SearchMobileComputing.com, powered by WhatIs.com) - Definition: Wi-Fi
(Source: SearchMobileComputing.com, powered by WhatIs.com) - Definition: Bluetooth
(Source: SearchMobileComputing.com, powered by WhatIs.com)
Managing a mobile workforce | Table of Contents |
- Tip: Managing mobile operators: Giving a passing grade
(Source: SearchMobileComputing.com, Nov. 3, 2006) - Column: Wireless options: Opportunity knocks
(Source: SearchSMB.com, Nov. 2, 2006) - Tip: Cellular bill management: Getting policies under control
(Source: SearchMobileComputing.com, July 19, 2006) - Article: SMS or mobile email: Which is the 'killer app'?
(Source: SearchMobileComputing.com, June 12, 2006) - Article: SMBs: It's a buyer's market for wireless service
(Source: SearchSMB.com, May 17, 2006) - Tip: Mobile device management: Part I -- Decisions, decisions, decisions
(Source: SearchMobileComputing.com, April 20, 2006) - Tip: Mobile device management: Part 2 -- Implementation options
(Source: SearchMobileComputing.com, May 15, 2006)
Security issues | Table of Contents |
- Article: Encrypting mobile devices: A best practice no one uses
(Source: SearchSMB.com, Nov. 1, 2006) - Article: Wireless cards make notebooks easy targets
(Source: SearchSecurity.com, Aug. 2, 2006) - Article: Mobile security begins with policy
(Source: SearchSecurity.com, Aug. 2, 2006) - Tip: Security for mobile devices: Simple steps for SMBs
(Source: SearchSMB.com, July 13, 2006) - Article: Portable storage devices invite big problems
(Source: SearchSMB.com, April 10, 2006) - Article: Fidelity laptop snafu spotlights need for security policies
(Source: SearchCIO.com, March 28, 2006)
Oldies, but goodies | Table of Contents |
- Tip: Understanding the wireless landscape, part 1
(Source: SearchNetworking.com, Jan. 6, 2004) - Tip: Understanding the wireless landscape, part 2
(Source: SearchCIO.com, Jan. 6, 2004) - Tip: Bluetooth Learning Guide
(Source: SearchCIO.com, Jan. 7, 2004) - Learning Guide: 802.11
(Source: SearchCIO.com, March 25, 2003)
More resources | Table of Contents |
- Resource Center: Mobile technology for the midmarket (SearchCIO-Midmarket.com)
- Website: SearchMobileComputing.com
- Website: SearchNetworking.com
- Website: MobileIN.com
- Website: O'Reilly Network Wireless DevCenter
- Website: JiWire.com
Start the conversation
0 comments