Weekly Enterprise Mobility Wrap-up: May 2-6
What’s Apple up to this week as far as taking the enterprise by storm? Also: ensuring the most common threats don’t take down your enterprise mobile strategy and how small businesses can leverage mobile just like big companies.
Apple Teams with SAP for iPad and iPhone Enterprise Apps
In yet another strategic partnership agreement (remember, Apple has also partnered with IBM and Cisco), Apple has announced that they will now work with SAP to bring common enterprise processes to peoples’ mobile phones. This is yet another step in the right direction for Apple as they bring their user experience expertise to the enterprise market.
Always think of the end-users in any mobility deployment
In implementing any mobile strategy, ultimately, if the end users don’t accept the solution it will be a failure. The best way to prevent this is to always keep in mind the needs of your end users while developing any mobile app that you aim to meet their needs.
7 ways small businesses can benefit from mobile apps
Not only can large enterprises take advantage of applying work processes to mobile, but small businesses too can use mobile to gain a leg up. Ultimately the use of mobile can ensure you stay connected to your customers, and keep employees engaged.
Mobile authentication and biometrics: A sign of things to come
For users of banking apps, the unfortunately reality is that passwords can be easily forgotten or stolen by hackers. With the recent introductions of biometrics, or the ability to unlock your phone with your fingerprint or voice, the banking industry is taking notice and organizations are considering the shift to this more secure approach.
5 mobile threats to your business—malware and OS vulnerabilities—and how to deal with them
Some of the top security threats to your mobile solution can include not only rogue software getting on the phone, but also the physical loss of a device. For the most part, prevention is the best way to avoid data breaches, but even with the most common threats it’s helpful to know how to re-in state security practices should a threat occur.