Novell announced the availability of Novell ZENworks Mobile Management.
ZENworks Mobile Management (ZMM) addresses the pain points device administrators and managers face today, including BYOD (bring your own device), security, application and file sharing, asset and inventory management and compliance issues. With this new solution, Novell extends its existing management and security capabilities to mobile devices.
Novell now gives enterprises the ability to control and secure a large and diverse set of mobile devices in the workforce, including iOS, Android, Symbian, Windows Mobile and other ActiveSync enabled devices, with minimal impact to IT overhead. The result is a more productive, agile and protected organization.
"The workforce is demanding mobile devices at work, whether they are company issued or personal, leaving administrators scrambling to catch up and solve the security and management challenges this brings. With this release, we're specifically addressing our customers' needs," said Eric Varness, VP of Product Management and Marketing for Novell.
"The release of ZENworks Mobile Management provides enterprises with an easy-to-install solution to oversee mobile devices while ensuring security and fostering workplace productivity. Employees get what they need to be productive from anywhere without undue risk and expense to the enterprise. Adding mobile device management to organizations endpoint management capabilities is the next logical step to ensure the security and integrity of enterprise data and applications."
Key features of ZENworks Mobile Management include:
- Over-the-Air/Hands-off Enrollment: Automates the process of enrolling new devices by leveraging ActiveSync mail server user credentials during the device registration process.
- Application Provisioning and File Sharing: Ensures the right applications and files are available to authorized users via the Enterprise App Store and management console.
- Customizable Security Settings: Empowers security teams and CISOs to define and customize security policies for mobile devices and audit enforcement, including encrypt/password enforcement and remote wipe.
- Inventory and Asset Management: Provides a view into what is connecting to an organization, as well as tracks and manages all the mobile devices in an organization.
- Alerts and Notifications: Gives the option to set alerts to automatically bring IT's attention to problems, violations or changes in security settings to ensure compliance, licensing and management needs are met.
- BYOD-Friendly: Works equally well with personally owned devices with enhanced features like selective remote-wipe (only wipe company data) and self-provisioning.
A recent report from Forrester finds that 53 percent of employees use their own devices for work, marking a five percent increase since the beginning of 2012. The research firm also predicts that within three years, BYOD will be standard policy for most companies.
Novell ZENworks Mobile Management makes it easy for organizations to provide BYOD support, ensuring users have the right credentials and access to applications and files on their mobile devices, where and when they need it.
Reporting and auditing functionality aids in compliance as ZMM provides visibility into who controls actions and processes while showing how activities are done making sure any necessary security actions are taken and documented to make proving compliance more efficient.
The Latest
According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...
In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...