Mobile Device Management For All
February 26, 2013
By Robbie Pleasant
, TMCnet Contributor
They say great minds think alike, and that might be the case with VMware and Citrix both releasing new management tools, each designed to help IT admins support mobile devices in the enterprise while keeping company data safe. Each can make BYOD simpler and safer, a necessity in today’s environment.
From VMware is the VMware Horizon Suite. This multi piece mobility platform helps users access their data, applications, and desktops from any device, no matter where they are. It’s comprised of the VMware Horizon View, Horizon Mirage, and Horizon Workspace, allowing admins to allocate data, applications, and so on to end- user groups, rather than devices. This way, users can view what they need while on—the—go with their credentials, rather than from specific devices.
VMware has also upgraded the Horizon View and integrated Mirage with the VMware ThinApp application virtualization. There’s also the new VMware Horizon Mirage 4, which separates PCs into layers owned and managed by IT or end- users.
Additionally, Citrix has released the XenMobile MDM. This enterprise mobile device management solution is a part of its Mobile Solutions Bundle for enterprise mobility management. It was created from the ground up to allow users to leverage their apps and data from whatever device suits them best, while providing IT with the tools neededto manage compliance requirements on the devices.
As part of the Mobile Solutions Bundle, XenMobile MDM is offered alongside software and apps for role-based management, configuration, and security, along with browser and data sharing capabilities.
Of course, those are far from the only mobile device management options currently on the market. There’s also a robust solution from MobileIron that combines data-driven mobile device management with wireless cost control in real-time. It helps firms deal with mobile support costs and security issues, as well as secures the phones and tablets employees may want to use. It works on multiple platforms, making it desirable for nearly any BYOD environment.
Whatever solution you may choose, security is vital in a BYOD environment. While these solutions all provide a broad range of control and security for mobile users, the choice ultimately comes down to your individual organization needs.
Edited by Jamie Epstein