Securing a mobile and geographically distributed workforce that has embraced social media and cloud-based technologies isn’t easy. But deploying, managing and securing your mobile IT environment doesn’t have to be complicated or expensive. This brief, straightforward administrator’s guide to mobile device security and management considers best practice approaches in 7 key areas, from creating effective policies to anti-theft activation, from containerization for BYOD to centralization and user empowerment.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership