Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Top tools for BYOD management

When we tested mobile device management (MDM) last year, the products were largely focused on asset management - provisioning, protecting and containing mobile devices.

What a difference a year makes. The products we compared in this round of testing have much stronger controls of specific smartphones and mobile operating systems, plus features like location-based tracking, usage tracking, two-factor authentication and sandboxing of personal and corporate identities.

Of the five MDM apps we reviewed, SOTI's MobiControl was very strong and understood specific phones and OS platforms very well. Tangoe had very strong enterprise-focused management features. Newcomer Webroot is promising, but still has work to do to catch up to the others in our test. SAP's Afaria, which we tested last year, sported a new, almost radical makeover that's a dramatic improvement over their last edition. Venerable LanDesk has added MDM to its desktop management suite, and while the installation phase gave us moderate willies, we came to appreciate the product's device controls, easy policy management and reporting.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: freemium, MDM, Tangoe MDM, Webroot SecureAnywhere Business-Mobile Protection, Networking, SAP Afaria, wireless, SAP, LanDesk Mobility Manager, SOTI MobiControl, Tangoe, Mobile device management
Latest Blog Posts
Whitepapers
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
  • The CIO Paradox
    As there are timeless leadership principles underlying IT value, there are unfortunately also timeless challenges that thwart the IT organisations efforts and make for a rocky path to CIO success. These are the inherent contradictions we call the CIO Paradox.
    Learn more »
  • Top 20 Critical Security Controls - Compliance Guide
    Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO