Premium Content

Access "Mobile device management: Law firm users bring their own"

Tracey Caldwell, contributor Published: 13 Oct 2012

Law firm Norton Rose wanted to embrace the collaboration and productivity gains of a BYOD (bring your own device) approach to mobility, but the firm knew all the well the legal ramifications of a mobile strategy gone wrong. Norton Rose provides business law services from offices across Europe, the Middle East and Asia Pacific and needed to offer its lawyers the same access to corporate email and information on the road as in the office, said Vlad Botic, technology innovation director for the group, which bases its IT and network systems in London. The biggest concern was the ability to secure and set user policy around personal devices, and Botic realized pretty quickly that would mean investing in a mobile device management (MDM) system. At first the firm issued corporate BlackBerrys, securing them with a BlackBerry Exchange Server. But so-called “consumerisation of IT” changed all of that—especially when employees began bringing iPads en masse. In finding a mobile device management solution to handle this influx, Norton Rose faced a fragmented and emerging... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...