Connected Devices and Apps for the Workplace

1/13/2014

We spend so much time in our personal lives having fun with mobile apps and connected devices the desire to bring this kind of technology into the workplace was inevitable. But the question becomes: How do companies go about managing the various apps and devices, and keeping them secure?

For many, the answer is Citrix’s, www.citrix.com, XenMobile program. XenMobile equips users with apps via the Worx App SDK (software development kit). In conjunction with Citrix’s own app container technology, the SDK can provide features like data encryption, password authentication, secure lock and wipe, inter-app policies, and micro VPNs (virtual private networks). All of this equates to apps that are safe and secure for the workplace.

XenMobile is also no stranger to MDM (mobile-device management), and gives both users and IT professionals a great deal of freedom. Citrix provides users with numerous local and Web-based training options, as well as global, 24-hour support. Employees are allowed to self-service enroll, while companies can select the optimal level of enrollment authentication to suit its risk profile. XenMobile can also rapidly respond to system alerts, and quickly remedy issues. Some devices even offer remote support via voice chat.


Another area connected devices could be big for business is with wearables. With its unique user interface Google Glass is unquestionably one of the more buzz-worthy connected devices in recent memory. The technology has also made its mark on MDM thanks to a collaboration with Fiberlink, www.maas360.com, via its MaaS360 program.

MaaS360 is able to monitor and influence a mobile IT environment using Google Glass. Users can lock, locate, or wipe a mobile device with a hand gesture, or even a voice command. This can offer tremendous efficiency, as users can take action within a matter of seconds.

MaaS360 allows Google Glass users to see their mobile data from a broader perspective, with the use of virtual mapping. If a piece of equipment is reported lost, an IT professional can enter a query, and see the device’s location via an on-screen map. If the device cannot be found, or has been stolen, the administrator can also erase the data remotely to prevent a security breach.

This collaboration allows messages to be sent to specific users using voice commands. For instance, if an employee’s connected device is out of compliance with security policies, an IT professional can instantly send them instructions to fix the problem.

Want to tweet about this article? Use hashtags #M2M #IoT #connecteddevice #wearable





Related Articles
Comments

Log in or Create Account to comment on this, or other articles:

Connected World Issue
Apr/May 2014
Subscribe!
magazine | newsletter
<< Take a look inside!


Advertising | Contact Us | Terms and Conditions | About Us | Privacy Policy | Press Room | Reprints | Subscriber Services
Copyright © 2014 Specialty Publishing Co. | Questions? Please contact the Webmaster at webmaster@specialtypub.com