V3 Enterprise Mobility Summit: Smartphones have the scope to radically change the way businesses operate.
Thanks to cloud services and increased mobile network speeds smartphones can offer constant access to key services and ensure that employees remain productive wherever and whenever they choose to work.
However, the darker side is that these devices are yet another threat to business operations. Loaded with company data, a lost or stolen smartphone can be an avenue for data loss.
As if this wasn't bad enough, hackers are also taking an interest in smartphones as an entry point to a business network.
Knowing how to take advantage of smartphones sensibly is a difficult question many companies struggle to answer.
Here to help, V3 news editor Dan Worth and senior reporter Alastair Stevenson discuss cutting-edge MaaS360 by IBM research in a video feature for the V3 Enterprise Mobility Summit.
Also make sure to sign up for the full V3 Enterprise Mobility Summit to get access to all the latest research, analysis and expert comment on mobility.
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software