LANDESK Acquires LetMobile to Strengthen Mobile Security

Mike Vizard
Slide Show

Seven Steps to Prepare for BYOD

Most providers of IT systems management software were caught off guard by the rise in popularity of mobile computing across the enterprise. The end result is that many IT organizations have acquired separate management frameworks to manage mobile computing devices. In an ideal world, IT organizations would only have to buy one systems and security management framework to manage all their desktop and mobile computing devices.

LANDESK took a significant step toward making that happen today with the acquisition of LetMobile, a provider of a secure mobile gateway for email and Web traffic that LANDESK plans to incorporate in its suite of systems management offerings.

Announced at the LANDESK Interchange 2014 conference, Stephen Brown, director of product management for mobility at LANDESK, says that unlike mobile management solutions that are focused on the device, LetMobile takes a more user-centric approach that focuses on securing enterprise data.

viz20140521-01

To that end, LANDESK today also announced it is making available application wrapping technology that organizations can use to secure applications, alongside providing a LetMobile mobile gateway that bi-directionally secures all the email and Web traffic between a data center and a mobile computing device without having to rely on container technology that is often too cumbersome for IT organizations to manage at scale.

Most IT organizations are struggling with finding a way to both manage and secure mobile computing devices that are proliferating across the enterprise. The challenge is that not only do users have notebooks, chances are high they are also using a tablet and a smartphone to access corporate applications. Taking a device-centric approach to managing all those devices simply isn’t practical, which means, like it or not, the time has come to find a new way to manage endpoints across the enterprise.



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.