Feeds

Microsoft to reach out and take control

...of Windows Mobile devices, at least

Boost IT visibility and business value

This evening Mr Ballmer is to announce Microsoft's "System Center Mobile Device Management 2008", which will compete with Nokia's better-named Intellisync to remotely manage mobile devices in the enterprise.

The to-be-announced software will integrate with Microsoft's System Center, and require a client application to be installed on all the Windows Mobile devices already deployed (presumably the client will be pre-installed in future). SCMDM will offer capabilities such as locking or disabling handsets which have been reported stolen, wiping data, and controlling functions such as the camera, or the ability for users to install their own applications.

Anyone already using a corporate-locked-down PC will be familiar with how annoying the limitations can be, but BOFHs appreciate the security advantages, and with mobile devices becoming part of the corporate IT infrastructure they need to be brought under the same control.

Ballmer is known to get somewhat excited during press conferences, and we'll try to convey some of that enthusiasm as best we can when we bring you the details. ®

The essential guide to IT transformation

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.