Gartner Blog Network

Category: 'mobility' Blog Posts

from the Gartner Blog Network

Enterprise Mobility Management Evaluation Criteria and In-Depth Assessments have Published

by Richard Jones  |  January 15, 2015

The Gartner for Technical Professionals Mobility team has just published the most recent Enterprise Mobility Management (EMM) Evaluation Criteria (EC) document, but more importantly for the first time, we have...

Read more »

Magic Quadrant for Managed Mobility Services

by Eric Goodness  |  July 30, 2014

Last week I published the second iteration of the Magic Quadrant for Managed Mobility Services. The study sought data, from providers and users, regarding MMS market performance and growth.  The study revealed...

Read more »

The Internet of Bling: PTC Acquires Axeda

by Eric Goodness  |  July 28, 2014

Last Wednesday, PTC announced that the company signed a definitive agreement to acquire Axeda Corporation. Axeda is a small software and services company with outsized visibility in the market to...

Read more »

Microsoft Turns the 'Scope on SaaS

by Merv Adrian  |  July 16, 2014

One of the more interesting conversations I had at the Microsoft Worldwide Partners Conference this week concerned an initiative they have launched to help IT understand - and get under...

Read more »

Catalyst 2012 and Mobile Futures

by Chris Wolf  |  August 3, 2012

This year at Catalyst we are going out with a bang, with industry heavyweights Brad Anderson (Microsoft) and Simon Crosby (Bromium) offering keen insights into mobility, application, data, and endpoint...

Read more »

Mobile Device Certificate Enrollment: Are You Vulnerable?

by Mark Diodati  |  July 2, 2012

Last week, US-CERT published a vulnerability note on the Simple Certificate Enrollment Protocol (SCEP). The vulnerability was reported by Certified Security Solutions, a consulting company with extensive Windows and PKI...

Read more »

RSA SecurID, Crypto, and Satan’s Computer

by Mark Diodati  |  June 27, 2012

You may have read about two recent vulnerabilities associated with RSA authentication products. Last month, a researcher specified how to copy a SecurID software token from one computer to another,...

Read more »

The Next Revolution In Mobility: Near Field Communication

by Mark Diodati  |  April 20, 2012

I want to welcome you to a multi-post discussion about near-field communication (NFC). Over the next few blog posts, I will be talking about: NFC’s moving parts Impending demand from...

Read more »

OTP Systems And Mobile Devices: Don't Make The Biggest Implementation Mistake

by Mark Diodati  |  April 12, 2012

The topic of the secure distribution of one-time password (OTP) secrets recently surfaced again as part of our ongoing mobility research. Many organizations make the classic distribution mistake; they couple...

Read more »

Commentary on Centrify's new MDM product

by Mark Diodati  |  February 19, 2012

Industry analysts discuss emerging concepts and current events with journalists. We are misquoted more than you might think (or we would like). Sometimes the misquote is minor. On occasion, the...

Read more »