IT Management Slideshow: 10 Mobile Traps To Avoid in the EnterpriseBy Don Reisinger | Posted 12-30-2011
Buying Android Devices
Android device sales were hot over the 2011 holiday season. As nice as those devices might be for consumers, they're a liability right now for enterprise users. They come with potential security and privacy problems and they're not ideally designed for corporate users.
Believing Android Is Secure
If you already have workers bringing Android-based devices to the office, it's time to educate yourself and your users about their security risks.
Applications are great for extending the functions of a smartphone. But without proper management, you'll end up with a free-for-all that could impact productivity or, worse, cause security problems for your company's data or network. Get your policies sorted now.
As the mix of mobile devices in your enterprise changes, you may be considering ditching your BlackBerry Enterprise Servers. Not so fast. The solution is integral to managing mobility, RIM is expanding functionality and its security features are unmatched.
Forgetting Use Policies
Employees need to be told what they can do, what they can't do, and what sort of ramifications there will be if they don't follow the rules.
Not Developing Proprietary Apps
Apple's iOS software development kit allows any company to create its own proprietary applications that won't be found in the App Store. You can use these to enhance the usability of the iPhone and iPad for your enterprise. If you're planning to bring iOS-based devices to the office, building your own apps is a great idea.
Ignoring Employee Desire
Like it or not, your employees know what kinds of mobile and wireless products and services they want to use. Trust them to know what will make them more productive than ever. Don't immediately dismiss their requests.
Using Native E-mail Apps
E-mail applications that come with iOS, Android, or Windows Phone 7 work beautifully for consumers but fall short for enterprise users. That's why some companies turn to solutions such as Good Technology's e-mail service, among other options, to take control of their mobile email.
Allowing Insecure Data Access
Safeguard mobile connections from end to end. If you can do that, you can allow employees to access data they need wherever they are without worrying about the security ramifications.
Pledging Allegiance to One Carrier
Finding the best deals is integral to any mobile enterprise plan. So, avoid lock-in, understand TCO and shop around for the best deals you can get to meet your corporate needs.