Manage Learn to apply best practices and optimize your operations.

Crafting a mobile device policy strategy

Learn how to develop and manage a mobile device policy, including mobile device security measures that can help you along the way, in this guide.

With an increasing number of midmarket organizations using mobile technology such as smartphones and other wireless devices, crafting an effective mobile device policy is vital. Keeping employees connected at all times requires a policy that ensures not only efficiency and effectiveness, but also data security.

But implementing a mobile device policy is just the beginning of managing mobile workforces. It's important for midmarket CIOs to stay up to date on the latest mobile technology and security concerns. Learn more about developing a mobile device policy, mobile device management and the latest mobile workforce security tools in this guide.

This guide is part of's Midmarket CIO Briefings series, which is designed to give IT leaders strategic guidance and advice that addresses the management and decision-making aspects of timely topics. For a complete list of topics covered to date, visit the Midmarket CIO Briefings section.

Table of contents

  Developing a mobile device management policy  Table of Contents

Going mobile is the "hot" thing to do right now. Smartphone proliferation in the corporate world has never been higher as businesses worldwide see the value in keeping employees constantly connected. But this influx of available devices and mobile technology also requires more IT responsibility.

It's crucial that an organization create a mobile device policy to explain the rules and commitments involved with allowing constant mobile access to company resources. Then, with security and consistency on your side, you can work on developing and supporting the applications and utilities that your end users have come to depend on to get work done efficiently and effectively.

Learn what factors to consider in "Crafting a mobile device management policy? Balance business and IT." Also:

  Staying proactive with mobile management  Table of Contents

Mobile devices have revolutionized the way we do business. Their benefits -- from having a phone at all times to the ability to get information from the Web and use some of the hundreds of thousands of available applications -- have made these devices a necessity for millions of people around the world.

These powerful, compact devices are also attracting a lot of negative attention -- millions of mobile devices are lost or stolen every year, and these numbers are expected to swell. It's critical that your organization not only have a mobile device policy in place, but also that you have the ability to remotely manage all of your devices.

So how do you balance the desire for a better device with the need to protect the information that your users will inevitably store on it? Find out in "Learn what IT can do to stay proactive with mobile management." Also:

  Tips to encourage a strong mobile workforce  Table of Contents

When you think of the word mobile, what comes to mind? A laptop? A smartphone? An iPad? All of these devices are options to help improve your mobile workforce -- however, being mobile involves a lot more than the device you choose to use. Back-end services need to be in place to support mobile workforce efforts. After all, if an organization has not rolled out mobile-friendly services, the device doesn't matter much.

Here, the CIO of Westminster College discusses the organization's implementation roadmap, outlining some key changes the school is making to set the stage for a mobile workforce.

Learn more in "Ways to set the stage to encourage a strong mobile workforce." Also:

  • Laptop security: Securing corporate data for users on the go
    Adhering to laptop security policies and best practices can prevent data loss and improve your organization's overall protection. Learn what midmarket organizations can do now.
  • Is mobile video conferencing worth considering in the midmarket?
    Improved technology can make mobile video conferencing with executive road warriors and remote workers easier -- but is it worth it?
  Mobile device security tips  Table of Contents

The availability of wireless devices, secured wireless networks, mobile applications, virtual desktops and, of course, smartphones, has provided small to medium-sized businesses with new mobile workforce opportunities. However, a mobile workforce requires tighter controls around acceptable use, security and support, and a strong mobile workforce management strategy.

How prepared is your organization for the wealth of mobile technologies your staff is beginning to take advantage of? To help address mobile workforce management overload, we've pulled together some sample mobile security policies, templates and tools to consider.

Find out more in "Mobile workforce management tips: Sample security policies, templates." Also:

  • Endpoint DLP fills data protection gap
    Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
  • Choosing smartphone encryption software for mobile smartphone security
    If your enterprise users have smartphones, then your enterprise may need smartphone encryption.
  • Netbook comparison: Matching netbook features to business needs
    Netbooks may prove handy for enterprise road warriors and virtual desktop users. In this quick corporate netbook comparison, learn how to sort through features and options.
  More resources  Table of Contents

Dig Deeper on Small-business infrastructure and operations

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.