Enterprises are more productive when employees can choose the technologies they like best to do their jobs. However, a complete free-for-all IT environment won’t stand up to compliance audits, security policy requirements, and generally accepted safe mobile computing practices. To that end, enterprises should consider the Android operating system’s (OS’) strong data separation, multiple device management options, and easy system enrollment capabilities as ways to balance IT controls with user satisfaction and device/app choice.
This white paper examines what IDC defines as the third pillar of enterprise mobile computing requirements: balancing IT enforcement with user acceptance. Following pillars 1 and 2 (Android security capabilities and Android solution breadth, respectively), this document in the series highlights some of the top IT and security management challenges that businesses face as the workforce increasingly brings personal devices, applications, and cloud services into the workplace. It outlines steps enterprises can take to help enforce security and compliance requirements in mobile enterprise computing without sacrificing user satisfaction with technology.
Wanneer je dit whitepaper downloadt ga je ermee akkoord dat je door de leverancier benaderd kan worden.