If you read my previous entry, you could tell that I’m all about talking to customers in IT first, then putting my head down to deliver what Enterprise IT groups are demanding in terms of control, security, management and visibility.

But as in any good product, management is only one half of the story. The other half is all about the product’s users. 

From conversations with clients, it’s apparent that mobile users everywhere are depending on one or more devices to do their jobs. They work from home, a cafe, at a client’s location or out in the field. Simply speaking, they are not tied to a desk from 9 to 5 anymore. And if companies want the same or higher levels of productivity, they need to give their employees access to documents, no matter where they are, no matter what device they use, 24x7. 

The advent of enterprise mobility has radically affected the way organizations conduct business. No matter whether you are talking to customers from markets as diverse as Pharma, Health, Financial, Education, Publishing, Advertising, Government, Legal, or service providers, it’s a fact that mobility is here to stay. But while it brings all kinds of benefits it also creates a new set of challenges.

Now organizations can be more productive than ever. CEOs can verify the latest contract while in the airport, researchers can work in the field and easily access all their data, and sales professionals can have access to the latest product presentations at any moment to lock in that big deal.

We’ve become far more productive and can even share synced files with teams distributed around the globe. However, this connectivity also raises flags about data security and how to prevent accidental leaks of sensitive files.

As organizations increase their use of mobile devices, it is becoming very apparent that the ability to access, sync and share content is a critical factor for their users. While many organizations have focused on MDM and the management and security of devices, organizations looking to the future are have content on their minds. How do we give mobile users secure access to content? How do we allow them to securely share content? How do we get them access anytime, anywhere and from any device? And how do we do all of this while addressing all of our security and management needs? How do you stay in control?

Acronis mobilEcho and activEcho do just that. They provide organizations, many in regulated industries, a comprehensive, secure solution for:

The BYOD Balancing Act

With Gartner expecting the mobile device management (MDM) market to be worth $1.6 billion by 2014, it’s obvious that the industry has become very prominent. But, the MDM market is still evolving at a feverish pace. Just take a look at the average employee’s bring-your-own-device (BYOD) habits. Smartphones, tablets and laptops are all part of one big mix during the work day. Thanks to the growth and of mobile devices and the emergence of more mobility apps  the needs of the mobile enterprise and their users is quickly evolving from being device-centric to being data-centric.

PRISM Exposes Enterprise Risks

An article in the Guardian last week revealed the U.S. government's PRISM program. The article outlined the government's alleged monitoring of communications at the largest Internet providers (seemingly with the help of these providers). This list of Internet providers includes Microsoft, Google, Yahoo, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. Now, I want to point out that these are all allegations and that none of this has been verified yet. However, it certainly raises a lot of questions. I wanted to hone in one of the areas that I took note of. There was a mention in this report of other providers the government wanted to monitor, including Dropbox. This again exposes some of the risks that are faced not only by consumers using Dropbox (and similar services) but also the exposure that enterprises and enterprise users face when using these types of services.