Bobboz - Fotolia

News Stay informed about the latest enterprise technology news and product updates.

UC blogs: Building on your enterprise mobility strategy

In UC blogs this week, analysts discuss how a mobile center of excellence can support an enterprise mobility strategy and how enterprises can evaluate PaaS applications.

Tony Rizzo of Boston-based Blue Hill Research discusses why enterprises should create a mobile center of excellence (MCoE) to support enterprise mobility effectively. He writes that mobility is now a business requirement, and a consistent, sophisticated end-user experience is key for enterprises.

Creating an MCoE ensures a high level of consistency across the enterprise and determines what an enterprise should deliver on and avoid for enterprise mobility. The MCoE should have a team that includes lines of business, IT and end users who will work together to create best practices that fit the needs of various workgroups and departments, Rizzo writes.

Read more about why enterprises should include MCoEs in their enterprise mobility strategy.

Evaluating PaaS applications

Gartner Research Vice President Richard Watson discusses a new Gartner report on evaluating enterprise application platform as a service (PaaS). He writes that while no two PaaS offerings are the same, developing criteria for enterprises to evaluate what features they need from a PaaS application is beneficial.

The report organizes the PaaS evaluation criteria into five categories: baseline criteria, planning the architecture, developing the application, deploying and operating the application, and governing and managing service levels. He writes that there are 187 criteria under these categories, including virtualization/hosting model, testing, data migration, security, compliance and access control.

Read more about how to use the criteria to evaluate PaaS applications.

BYOD reshaping network security

Zeus Kerravala, founder and principal analyst at ZK Research, discusses the impact of BYOD on network security. He writes that BYOD creates new security threats like malware from phishing sites and emailed documents that bypass traditional security measures. Organizations must think differently about security to protect themselves.

Organizations should extend security measures beyond the network edge to include methods like CPU-level threat protection, Kerravala writes. CPU-level threat protection finds and blocks malware before it can infect devices. This method also searches for attacks that bypass an operating system's security and eliminates any threats.

Read more about how network security should evolve to address new vulnerabilities.

Next Steps

Choosing the right enterprise mobility strategy

Evaluating PaaS application vendors

Setting BYOD security policies to protect UC apps

Dig Deeper on Mobile Unified Communications