Are Enterprises mobile yet?

by Brian Katz on October 24, 2014 · 0 comments

I spend a lot of time talking about mobility. To be fair, it’s part of my job. Yet, it’s disheartening at times to look around and see that most people don’t get it. They know that enterprises have to do more then hand out mobile devices. They need to have a mobile strategy that is part of their business strategy. If they’ve been listening closely, they understand that the idea of mobility is to enable your users. It’s only when your users are empowered to be more agile and flexible, and become more productive and efficient that you can start looking at them as truly mobile enabled. Yet, as my good friend Bob Egan pointed out to me recently, most companies (he put it at around 90%) aren’t doing much more than email, calendar and contacts. [click to continue…]

{ 0 comments }

The Four Pillars

October 14, 2014

Robert F. Kennedy said, “Only those who dare to fail greatly can ever achieve greatly.” It’s among the scores of failure quotes meant to encourage us to take chances and turn our defeats into victories. Daring greatly in the app world is important, but it doesn’t mean that you have to fail or suck into order [...]

0 comments Read the full article →

Shiny New Toy Season

September 8, 2014

We’re a little more than 24 hours away from Applepalooza and the rumors have hit the fan. Shiny new toy syndrome is about to kick in at work and hundreds of devices are accidentally going to fall from pockets or into toilets etc in the next few days in hopes of getting one of these [...]

1 comment Read the full article →

Balancing security and usability

September 5, 2014

I spend a lot of my time talking about mobility and enablement. When I’m not doing that the talk usually turns to security. So I had to pause today when someone asked me how do you balance mobility and security. I didn’t really understand the question. Why were people worrying about balancing mobility and security? [...]

2 comments Read the full article →

Infosec Doesn’t have to be a Four Letter Word

August 28, 2014

I wrote earlier this week about Identity and Access Management (IAM) and how it’s important for Infosec (Information Security) to be involved with projects early. The post generated a few comments and some commentary on twitter, mostly from Infosec folks. Some complained I was too harsh on Infosec (I wasn’t) while others worried that I [...]

1 comment Read the full article →

Who’s on first?

August 26, 2014

I spend a lot of time talking about organizations enabling their employees through the use of mobile. It’s truly the only way to ‘win’ at this game. When you enable your users to be more flexible and agile they become more efficient and productive. What more could you ask for? The question always turns to [...]

5 comments Read the full article →

iOS, Android, Who cares

August 22, 2014

I have people ask me all the time what smartphone or tablet should they buy. They’re usually disappointed when I don’t have a stock answer. I like to ask them a few questions first. Based on their answers, I usually make a recommendation of one OS or the other. This becomes much more of an [...]

0 comments Read the full article →

It’s not Shadow IT, it’s Shadow Innovation

August 20, 2014

We all hear about shadow IT. It’s a scary term, brought up in articles and conversations. It’s defined as people going around the rules and policies of IT or implementing technology outside of IT’s purview. It’s used by a lot of vendors to point out what can be going wrong in a company. Normally they [...]

4 comments Read the full article →

BYOD, or really BYOP – Bring Your Own Plan

August 19, 2014

I read an article today on BYOD (Bring your own device) and how the whole concept could be in trouble. It’s nothing new to see BYOD being seen as the next big thing or for it to be fading away depending on whom you’re talking to. In this case the post was pointing out a [...]

0 comments Read the full article →