SearchMobileComputing.com's tutorials provide informative online resources and information for IT managers regarding deployment, management and security of a mobile computing workforce. We provide comprehensive coverage and practical advice for selecting, tracking, supporting and securing mobile users and devices. With our tutorials, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage.
Requires Free Membership to View

Many experts recommend that organizations establish a mobile device security policy, but a policy is worthless without the technology and processes to back it up. Managers and architects responsible for planning mobile devices and deployment need to understand the nuts and bolts of delivering access when device types and connectivity options are many. In this expert lesson, you'll find in-depth discussion of the various methods and tools required to authenticate, control, and secure enterprise network access by mobile endpoints, from laptops to smartphones.
Mobile device management checklist
According to Forrester, employee handheld use expanded at 69% of North American businesses
last year, but most still lack a cohesive plan to handle this fast-growing tidal wave. Ideally, IT
should be managing those new smartphones and PDAs throughout their entire lifecycle, from
activation to retirement. In this mobile device management checklist, we highlight business needs
that you should consider when developing your own mobile device management strategy.
Study guide: Windows Mobile evolution
In this guide, we recap Windows Mobile's evolution and look at the wide array of Windows
Mobile-powered devices available to untether today's workforces. We'll explore where and why
Windows Mobile devices are used to support a wide range of mobile apps, from vertical business
automation to knowledge worker access. Finally, we'll examine the appeal of ready-to-roll apps like
Office, Outlook, and Communicator Mobile that integrate seamlessly with enterprise and in-the-cloud
Windows services.
Securing corporate data on your laptops
Mobile computing has opened a whole new frontier in data security. In this tutorial,
independent information security expert and noted author Kevin Beaver discusses laptop security
issues he has recently seen in the field that you may not have considered or that you might be
looking at from the wrong perspective. He'll outline what laptop security means to your business,
tell you how to protect your valuable corporate data residing on your laptops and show you how
laptop weaknesses are being exploited. This series concludes with a list of steps you can
immediately take to ensure data protection and device security.
Developing and instituting corporate mobile device
policies
As enterprise mobile connectivity becomes increasingly pervasive, IT organizations face the
challenge of creating mobile policies that allow users to be productive, while at the same time
protecting corporate assets. This series is aimed at helping enterprises develop and institute a
mobile policy.
This was first published in February 2011