From national chains to neighborhood shops, retailers understand that tablets can greatly enhance shopper experiences and they continue adopting this technology in store. Tablets and their applications possess such potential for changing the way people shop and spend that eventually all stores will be connected.
Today’s shoppers are more knowledgeable than ever before, and they’re demanding in-store, experience-altering technology – digital price tags that reflect price changes, kiosks that provide assistance and deals, and mobile checkouts, for example. Retailers are appealing to these shoppers with tablets, and are using these devices to interact with shoppers and to drive sales.
Here are five ways retail stores are creatively using tablets to reach today’s shoppers: (more…)
A recent study by IDC found that more than 80 percent of document work is still not digital, with documents being printed often, especially when signatures are required. For today’s increasingly mobile workforce, the need to print documents can hamper business productivity.
In a move that aims to eliminate the hardships of working with digital documents and the need for paper, Adobe is introducing new software that makes it easier to handle important documents in the office, at home, or on the road. Working with PDFs has never been easier.
Adobe Document Cloud (DC) is a new cloud-based management hub that organizations can employ to create, review, approve, store, sign, and track documents. Acrobat DC offers dozens of new features for managing and working in PDFs that allow workers to create and manage documents from anywhere — a new touch-screen interface, digital editing functionality, e-signature capabilities, and more. (more…)
It’s the beginning of a new year, and organizations are rolling out new IT initiatives and goals for the next 12 months. If that means a migration to iPads or iPhones or a refresh of your current Apple devices, you have a new option on the table to quickly and efficiently deploy them under an MDM solution.
Apple now allows select third-party resellers to offer Device Enrollment Program (DEP) to their business customers, giving organizations new options for device deployment and management. Organizations can now receive the benefits of DEP, including full hardware set up and configuration, software installation, and support, without going through Apple.
After enrolling in DEP with assistance from a third party, commercial organizations can more easily set up and deploy devices and guarantee the proper safety protocols are in place, without the legwork that often complicates mass deployments. At this time, education institutions can enroll in DEP, but must enroll through Apple. (more…)
The needs of working professionals that are frequent flyers are unique, so what’s the perfect gift for them this holiday season? Probably not more snack baskets of cookies, cheeses, jams, and chocolates.
Instead, get a gift that every business traveler can use. What does a professional really need when they’re on the road? They need power and performance, but without sacrificing space in the overhead compartment, and while looking the part too. But hurry, time is running out, so splurge on the business professional on your Christmas list and upgrade the mundane essentials they already use with these practical and powerful last-minute gift ideas. (more…)
Cloud security has been a top concern ever since organizations first began to shift data into the cloud and away from on-premises solutions.
While many cloud providers offer robust enterprise capabilities, including encrypted content, passcodes, and mobile device management, many can still fall victim to a serious security risk: data leakage.
Blake Brannon is a senior solutions engineer at AirWatch by VMware.
In an age where organizations and employees muddle the boundary between personal and private devices, employees can often access or transfer data to their unmanaged and unprotected devices. Providing employees with the ability to transfer and share sensitive data significantly increases the risk of data leakage.
The cloud leakage problem is one of the greatest threats to enterprise content security. While many cloud solutions secure enterprise content within the cloud infrastructure, they often lack the controls necessary to keep mobile users from downloading and walking away with critical information on personal, unsecured devices. However, there are powerful mobile security solutions that provide extra security for content in and out of the cloud. Here are the top five features companies must look for when choosing a mobile security solution that ensures content is secure.
Email protection — One of the easiest ways for employees to compromise content is by emailing secured cloud data to themselves on unprotected, personal email accounts. This not only leaks corporate content outside of an organization, but places it at greater risk of external hacks. Find a mobile security solution that can rein in rogue emailing and button up this source of content leakage by allowing only managed devices to synchronize with and download content from the cloud. These solutions also enable IT teams to monitor downloaded content, further securing your data.
Download prevention — The advent of the cloud means IT can no longer contain sensitive content behind four walls, and managing what devices can access company data has its limits with some cloud solutions. The easiest way to prevent employees from downloading sensitive data to personal devices is by forbidding external downloads onto unsecured devices altogether. But with some services, users can access content with phones that aren’t managed, creating a major backdoor into your data. Fixing this problem will take some integration between the technology and the particular ecosystem, but this issue will likely be addressed sooner rather than later. For now, find a solution that can limit what devices have access to content in the cloud. (more…)
The number of devices that rely on network connectivity to do their jobs is skyrocketing — mobile-connected devices will outnumber people in the world by the end of the year, according to Cisco. All those smartphones and tablets are improving productivity and access to data, but they can also become security risks that open your network to attacks. The vulnerability of network connections has always been a problem, but the more devices are linked, the more risks you’ll have to manage, and the more stringent your security will have to be.
No potential threat is greater than the Internet of Things (IoT). As the IoT takes hold in organizations, it will exponentially multiply the number of devices on your network, connecting everything from thermostats and HVAC systems to vehicles and manufacturing equipment. Experts expect 26 billion connected units by 2020.
Every organization is facing the inevitability of the IoT and must take a stand against future security risks now. Here are three things you should do to take control of your connectivity and head off any risks as we brace for an explosion of devices as part of the IoT. (more…)
The tablet landscape is crowded with iPads, Galaxy Notes, Kindles, and Surfaces, each including a different blend of features, that IT managers must carefully evaluate to select the tablet that best the needs of thousands of users. Unfortunately, there is no “best” tablet for any industry or organization — it all depends on what systems you’re currently using and what functions you need to achieve defined goals. That’s exactly what a Texas school district recently discovered as it navigated this exact situation, vetting the many tablet options to find the one that best fit its teachers’ needs and its existing IT infrastructure. Here’s how the school district narrowed down the tablet field and what option they ultimately settled on.
The district sought to equip its 2,200 district teachers with tablets to aid in classroom activities and increase mobility and productivity throughout the school year. But many tablets could achieve those objectives. The district was unsure which tablet would offer the greatest benefits, and needed to narrow down the choices. It turned to longtime partner SHI to dig into its true needs and match the district with the right device.
SHI defined the district’s six key device needs as follows: (more…)
Bring your own device (BYOD) has slashed hardware and maintenance costs and fueled mobile productivity at companies large and small, and adoption is accelerating. Gartner estimates that by 2020, 45 percent of organizations will be all BYOD, while 40 percent will offer a mixed program, and only 15 percent won’t have any BYOD program in place.
But while BYOD can be a positive policy for numerous industries, it’s not going well for all organizations, especially those that have ignored the potential hazards associated with the policy.
Last year I discussed two unexpected consequences of BYOD, but since then the risks have expanded as available technology diversifies and new mobility demands arise. Here are five additional pitfalls of BYOD environments, and how organizations can avoid them: (more…)
Apple recently introduced mobile device management (MDM) for iOS as part of a new focus on enterprise markets. This is great news for both the companies that steered clear of iPhones and iPads until now and those that dove into iOS despite the enterprise limitations. One aspect of the move is especially welcome: Apple expanded its Volume Purchase Program (VPP) to create VPP Credit. Under the program, businesses can now purchase large volumes of apps in bulk through purchase orders (POs).
While iPads have been a mainstay of the workplace for years, companies struggled to manage work-related applications housed on each individual device. Initially, app purchases were conducted per user and individually charged back to the enterprise. Not only was this tedious, but the moment employees left an organization, they took all of the pre-installed, company-purchased apps with them. Organizations could lose out on hundreds of dollars per device. (more…)
Apple recently introduced a mobile device management enrollment solution for iOS that would make it easier for enterprise and education customers to roll out mass numbers of fully configured iPads or iPhones to employees without ever touching the device. For many in enterprise IT, this makes iOS a lot more appealing.
But that’s not to say the enterprise has ignored iPads and iPhones until now. In fact, Apple has made significant headway into the enterprise market over the last five years, with sales surging more than 1,000 percent at SHI. Not to mention that iOS activations made up 73 percent of total device activations in the fourth quarter of 2013 among enterprises.
Even before a solution existed for a smooth enterprise deployment, many pioneering organizations sought out iOS anyway, a testament to the strengths of Apple’s products. But still, having every user install the necessary apps and configure settings would have been a major drain on time and resources. (more…)