by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2013
7 CDWG.com | 800.808.4239 physical boundaries of the organization. Sensitive information becomes particularly vulnerable to cyberthieves as it moves across external networks and may be accessed by unauthorized viewers if devices are lost or stolen. Technology-based security measures encompass methods for user and device authorizations, device and data encryption, VPNs and sandboxing (the ability to wall off certain data and applications to make them less vulnerable to intrusions). Other basic measures include device-side anti-virus software and the ability to manage configurations and patches. e team also must come up with contingency plans for controlling damages if a breach does occur. Full or selective wiping of data from missing devices is one common approach. If the organization retains the right to remotely wipe lost or stolen devices, the policy should explain whether a wipe will include removal of personal data or just the information contained in an organizational sandbox. One way to exert these controls is with MDM solutions that let organizations centrally enforce policies. Some entities extend this approach by focusing their efforts on the data itself with mobile application management systems. With MAM, the organization enforces policies for entity-related applications and data, not the devices themselves. From a mobile policy standpoint, the rulebook can also require mobile users to download a specified MDM or MAM system. STEP 7: MANAGE THE ROLLOUT. e next step is to create a game plan for what is, in essence, a public relations effort. e organization must determine how to communicate the policy and educate workers about what it will mean for them. It's advisable to first explain the salient points to group managers and then to groups of staff members. "Do you just send it out via email and say, 'Here, read this?' Or do users have to check a box that says they've read the policy and agree to follow it?" Kotikalapudi says. Once the policy is complete and all users are aware, it's time to put the policy into practice. e best starting point is often a pilot, especially if this is a new policy. Consider enlisting staff members who are already interested in or stealthily using their own devices. Beginning with a small group that's representative of various users within the organization will help determine what's working and what isn't. It also provides time to collect data to measure benefits and costs. STEP 8: ADDRESS ONGOING CHANGES. Experts say there's one final step for keeping a mobile policy viable: regular reviews and updates to assure the strategy continues to address the latest technologies and operational needs. Source: Forrester Consulting on behalf of Cisco Systems, February 2012 Increased staff responsiveness and decision-making speed Faster internal issue resolution Increased worker productivity Improved client satisfaction Reduced fuel, gas or fleet maintenance costs Reduced sales cycle time Competitive differentiation It's too soon to tell Improved brand perception Reduced inventory costs 76% 59% 47% 43% 29% 23% 14% 13% 10% 4% FOLLOW US BENEFITS FROM DEPLOYING MOBILE SOLUTIONS
August 30, 2013
September 30, 2013