Ask the Experts
Ask the Experts
-
What's the difference between jailbreaking and rooting?
To secure corporate smartphones, IT must ensure these devices have security measures in place. Jailbreaking and rooting remove these restrictions and create vulnerabilities. Continue Reading
-
Can you accept credit card payments on an Android phone?
Many consumers prefer contactless payments, and vendors can easily enable them with a smartphone and the right software. Learn how to set up an Android to accept customer payments. Continue Reading
-
What is the Rabbit R1, and what can it offer the enterprise?
Is an AI-powered device the next step in AI development, or a marketing gimmick? IT must explore whether the Rabbit R1 and its operating system offer real business benefits. Continue Reading
-
What fees come with accepting Apple Pay for businesses?
Apple Pay simplifies checkout for customers, but setup isn't always as straightforward. IT admins can review the costs to decide if Apple Pay makes sense for their organization. Continue Reading
-
What are the steps to set up a Managed Google Play account?
Android administrators can use Managed Google Play to deploy enterprise apps, configure permissions and more. Learn how to get started with a Managed Google Play account. Continue Reading
-
Does a hotspot work when a mobile device has no service?
Cellular service is necessary for establishing a hotspot connection. IT must know what to do when remote users are dealing with both Wi-Fi and service issues. Continue Reading
-
When should you use Android Enterprise Essentials?
With the Android Enterprise Essentials program, organizations get simple and basic device management. However, this approach isn't a great fit for all organizations. Continue Reading
-
How can Android Enterprise Recommended improve user privacy?
To simultaneously tackle the issues of mobile user privacy and security, IT can deploy Android Enterprise Recommended devices and partition them with a dedicated API. Continue Reading
-
Should IT use Apple Business Manager without MDM?
With the Apple Business Manager service, organizations can control Apple ID on device apps. But this may not be enough functionality for organizations to forego MDM entirely. Continue Reading
-
How to integrate mobile threat defense and UEM such as Intune
Mobile admins can use mobile threat defense integrations with UEM to provide deeper visibility into the threat level of mobile devices and additional security controls. Continue Reading
-
How can mobile app virtualization improve BYOD app access?
Mobile app virtualization isn't a new technology, but the latest generations of smartphones have made this technology more viable for everyday use for enterprise mobile users. Continue Reading
-
What new Android 11 features should IT know about?
Android 11's public beta has revealed several new features that IT admins should take note of, such as incremental app installs and more detailed information on app data access. Continue Reading
-
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
How does the aggressive iOS 13 RAM management affect UX?
Apple's iOS 13 comes with RAM management that may terminate mobile apps that aren't in use. Apple has somewhat addressed this with updates, but some of the core issues remain. Continue Reading
-
How can IT address smartphone battery drain and mobile UX?
Here are smartphone battery tips that admins should keep in mind. Find out all the factors that could affect the battery life and how IT can mitigate smartphone battery drain. Continue Reading
-
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users. Continue Reading
-
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well. Continue Reading
-
How does Excel's Insert Data From Picture feature work on mobile?
The Microsoft Excel mobile app allows users to upload data through a photo. IT professionals should learn how this process works so they can test its efficacy and train users. Continue Reading
-
What native Android encryption options should IT consider?
Android encryption has evolved over the years, and full-disk encryption isn't an option in Android 10. IT must learn the best native encryption options for managed Android devices. Continue Reading
-
How will Project Mainline for Android devices help mobile IT?
Project Mainline promises to make the Android update process more segmented. This new structure allows IT to push out critical updates without risking OS compatibility issues. Continue Reading
-
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
-
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process. Continue Reading
-
How can zero-touch enrollment help Android admins?
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can benefit from this method. Continue Reading
-
Why do mobile admins need Android Enterprise management?
Google is pushing Android Enterprise management and deprecating Device Admin features. Find out why IT should fall in line and migrate to Android Enterprise. Continue Reading
-
Which Android Device Admin APIs will Google deprecate?
With the release of Android Q, Google will discontinue several Android Device Admin APIs. Learn which Android management APIs will be deprecated and which will remain. Continue Reading
-
Phablet vs. tablet: How can IT determine which option is best?
For mobile endpoints, IT must determine the best choice of phablet vs. tablet. IT should examine the strengths and weaknesses of each device type before making a choice. Continue Reading
-
How can IT consolidate UEM and IAM tools?
As UEM tools begin to add IAM features and vice versa, IT should consider ways to bridge the gap. Determine how to combine the capabilities of each tool. Continue Reading
-
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
-
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
-
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks. Continue Reading
-
How can IT use the OAuth 2.0 protocol for iOS 12 devices?
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too. Continue Reading
-
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
-
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively. Continue Reading
-
What problems occur with Intune app protection for Outlook?
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction. Continue Reading
-
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
-
What are the use cases for blockchain in mobile apps?
Blockchain can bring a variety of benefits to enterprise mobile apps. Explore some use cases before integrating this secure technology into mobile apps. Continue Reading
-
How can IT determine the optimal smartphone lifespan?
Smartphones don't last forever. Here's how organizations can determine their lifecycles to avoid security issues and keep smartphones functioning at peak performance. Continue Reading
-
How can organizations calculate the TCO of mobile devices?
There are a variety of factors to evaluate when determining the true cost of mobile devices in an organization. Unpack these factors to find the TCO. Continue Reading
-
What do the major mobile OSes offer for enterprise features?
Mobile devices are now commonplace in the enterprise. Discover which vendors are touting enterprise-ready features and which are reluctant to jump into the enterprise realm. Continue Reading
-
How can AI in mobile technology improve security?
AI can help IT better detect mobile security threats, so determine how to take advantage of this nascent technology. Prep for AI-based systems to enter the mobile security market. Continue Reading
-
Review Office 365 mobile app updates
As Microsoft retires some of its mobile messaging-related services and improves others, the future of its mobile presence could be in one app -- the Outlook mobile app. Continue Reading
-
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help. Continue Reading
-
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities. Continue Reading
-
What are the advantages of rapid application development?
RMAD requires less know-how, but still reduces the costs and risks typically involved in a traditional app build. Delve into the advantages of adopting RMAD products. Continue Reading
-
Is choosing non-native over native mobile apps risky for developers?
What's more risky: developing cross-platform or native mobile apps? One expert chooses sides in the native vs. non-native/cross-platform mobile apps debate. Continue Reading
-
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking. Continue Reading
-
How does Box security help with auditing and compliance?
Box's security features help IT admins audit data access and limit the sharing of sensitive information stored in the cloud. Continue Reading
-
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading