View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
February 1, 2012

IBM to help enterprises manage and secure BYOD devices

New tool from IBM will remotely set policies, identify potential data compromises and wipe data off BYOD in the event of theft or loss

By CBR Staff Writer

IBM has introduced mobile security and management software for organisations to help them manage and secure the explosion of smartphones and tablets in the workplace, in addition to laptops, desktops and servers.

The IBM Endpoint Manager for Mobile Devices extends security intelligence to handle the growing threats from mainstream adoption of the BYOD trend, and remotely sets policies, identifies potential data compromises and wipes data off the devices if they are lost or stolen.

IBM Mobile Platform vice-president Bob Sutor said in order for organisations to take advantage of BYOD trend, it is important that organisations have mobile security and management policies in place.

"The new offering from IBM will help organisations manage personal and enterprise-owned mobile phones and tablets across IT networks in order to minimize risk, increase productivity and enhance innovation," said Sutor.

Through this software, organisations can use a single offering to secure and manage smartphones and tablets, as well as laptops, desktop PCs, and servers, said the company.

In addition, the software helps configure and enforce passcode policies, encryption and virtual private network settings, and manages Apple iOS, Google Android, Nokia Symbian, and Microsoft Windows Mobile and Windows Phone devices.

IBM Endpoint Manager for Mobile Devices enables customers to safeguard data, provide flexible management, maintain compliance and to unify the infrastructure.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.