Martin Courtney asks how IT departments handle security and user access management on wireless networks
Mobile computing has truly come of age in the past couple of years. This is due in part to portable wireless devices combining internet access, email and mobile business applications with voice-cal...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders