V3 Enterprise Mobility Summit: Smartphones have the scope to radically change the way businesses operate.
Thanks to cloud services and increased mobile network speeds smartphones can offer constant access to key services and ensure that employees remain productive wherever and whenever they choose to work.
However, the darker side is that these devices are yet another threat to business operations. Loaded with company data, a lost or stolen smartphone can be an avenue for data loss.
As if this wasn't bad enough, hackers are also taking an interest in smartphones as an entry point to a business network.
Knowing how to take advantage of smartphones sensibly is a difficult question many companies struggle to answer.
Here to help, V3 news editor Dan Worth and senior reporter Alastair Stevenson discuss cutting-edge MaaS360 by IBM research in a video feature for the V3 Enterprise Mobility Summit.
Also make sure to sign up for the full V3 Enterprise Mobility Summit to get access to all the latest research, analysis and expert comment on mobility.
Microsoft seizes control of phishing sites linked with Russian state hackers
Fitness trackers over-estimate the number of steps their users take, analysis of 67 research reports suggests
Everything we think we know about the imminent Apple iPhone 9, iPhone 11 and iPhone 11 Plus launches
All the latest rumours about Apple iPhone Displays, CPUs, launch dates and even prices
Nvidia brings Turing microarchitecture into the high-end gaming segment