is fundamentally based around the management of the device and OS ecosystem in a secure fashion while not prohibiting productivity, and ensuring employee privacy is not restricted as company IP is protected. With all these considerations, it’s not surprising that companies need direction.


As much as IT departments are predicting future user needs and educating them on the possible, so must they be educated themselves.


When looking at enterprise mobility most organisations are encountering a number of different issues as the enterprise incorporates new SaaS applications and mobile devices into business process. Password management, legacy application mobile availability and IT resource drain – to name but a few. Triangle are helping organisations overcome this with employee self management portals. This involves a corporate ‘app store’ with single-sign on functionality. Without IT involvement, employees are empowered to download applications which they have permission to access, onto any enrolled device and they will be automatically signed in.


They do not actually hold specific login credentials per application, which adds an extra layer of security for the organisation.


An effective enterprise mobility strategy is focused on the user, from day 1 through to that employee leaving. Upon enrolment, specific securities policies can be set through a user friendly management portal. That employee has access to all the applications and documentation they need to be productive immediately. Throughout their time there, they are bound to security policies (eg. passcode on the device) which will automatically action restrictions without IT intervention. When that employee decides to leave, data on that device can be quickly wiped and access to corporate applications and data revoked.


These policies will be tailored to corporate owned or BYOD devices, which is invaluable with the employee privacy versus IP security debate.


The answer we’re seeing to BYOD is the container, which places a wrapped folder on the employee owned device. This holds all corporate data in a secure manner while separating it from any personal apps and data. Suddenly the container can be viewed, in IT management terms, the same as a corporate device.


This same idea can be applied to corporate documentation, those which need to be up-to-date – health and safety policies, sales presentations, board papers, contracts and so on. With content lockers, companies can securely push corporate documents onto a container on the phone, where they will always have the latest version. Again, access can be restricted or revoked at anytime, meaning this can be on corporate owned or BYOD devices. There are also a host of productivity add ons to facilitate mobile collaboration.


Answering the question of how to accommodate the new world, starts with discovering what needs to be achieved. Mobile being such a growing industry, and user driven space there is hundreds of different use cases and applications. At Triangle we’ve seen a lot of them, we’ve been on this journey since day 1.


We’re plotting your business processes and identifying the most appropriate technology to suit the organisation and user’s specific needs.