Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Top 7 mobile device management tools to consider
From device security controls to onboarding features, MDM tools offer a wide range of capabilities. IT teams should explore the options to find the software that fits their needs. Continue Reading
Should you consider open source mobile device management?
Determine whether the open source route is best when it comes to managing mobile devices. To start, weigh the pros and cons, and then evaluate the market. Continue Reading
4 mPOS apps to turn a mobile device into a payment terminal
With the right software, almost any mobile device can be a payment terminal. Learn about the mobile point-of-sale options beyond Tap to Pay on iPhone and Tap to Pay on Android. Continue Reading
-
How to conduct a mobile app security audit
To keep corporate and user data safe, IT must continuously ensure mobile app security. Mobile application security audits are a helpful tool to stay on top of data protection. Continue Reading
Top 5 mobile payment systems to consider
Mobile payment systems can vary in terms of their fees, setup process and functionality. Organizations must know how to choose the right one to fit their business needs. Continue Reading
3 best enterprise mobile app authentication methods
Mobile app authentication is a foundational security strategy for remote and hybrid workforces. Learn how to choose between passwords, multifactor authentication and biometrics.Continue Reading
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security.Continue Reading
The ultimate guide to mobile device security in the workplace
Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT.Continue Reading
What BYOD trends will take hold in the business world?
As employees and organizations come to expect greater mobility, BYOD is an important consideration in the successful planning and execution of the remote and hybrid workplace.Continue Reading
Why should businesses use and accept Apple Pay?
Apple Pay is a popular payment method with Apple users, and many organizations have added the option at checkout. Find out why it can be beneficial to accept Apple Pay.Continue Reading
-
Finding the best mobile hotspot option for remote work
Organizations that allow the use of mobile hotspots for remote work must know how personal hotspots and dedicated hotspot devices differ. Compare these hotspot options.Continue Reading
Could the iPhone 15's USB-C port drive device consolidation?
With the coming of the new iPhone with the USB-C port, organizations might look at this new compatibility feature as the impetus for some changes to their device policies.Continue Reading
Are iPhones more secure than Android devices?
Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android differ, mobile security comes down to management.Continue Reading
Comparing iPhone vs. Android for business
Organizations deploying or managing smartphones for corporate use should know how iPhone and Android compare in an enterprise setting. Factors such as UX are key differences.Continue Reading
A fresh look at business use cases for AR and VR
AR and VR have matured over the years as technologies, but the business use cases haven't been as sticky. However, the future could hold an unexpected use case -- desktops.Continue Reading
Does a hotspot work when a mobile device has no service?
Cellular service is necessary for establishing a hotspot connection. IT must know what to do when remote users are dealing with both Wi-Fi and service issues.Continue Reading
7 key benefits of enacting a BYOD policy
While some benefits of a BYOD program are obvious, such as allowing users to only carry one endpoint, other benefits are worth exploring, such as lowering corporate emissions.Continue Reading
mobile application development platform (MADP)
A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and deploy mobile apps for smartphones or tablets.Continue Reading
mobile application management (MAM)
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.Continue Reading
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments.Continue Reading
How long should you support Android phones in the enterprise?
The Android OS can run on a wide range of devices, but how long should enterprise organizations support Android phones? Find out which factors help determine the lifecycle length.Continue Reading
What is wireless communications? Everything you need to know
Wireless communications is the transmission of voice and data without cable or wires.Continue Reading
Finding the best cellphone plans for small businesses
A business mobile plan is common in the enterprise, but the picture isn't as clear for SMBs. If an SMB opts to purchase a phone plan, there are many options to choose from.Continue Reading
How small businesses can pick the right mobile devices
To cash-strapped SMBs, deploying mobile devices may seem excessive. However, mobile devices are valuable tools to increase communication and productivity for business users.Continue Reading
Top mobile apps for SMBs
While there are many options for mobile applications that can help enterprise organizations accomplish business goals, some options are better suited for SMBs.Continue Reading
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises.Continue Reading
How to add an Apple TV to Apple Business Manager
Apple Business Manager can provide some basic management functions for Apple TVs, and organizations need to make sure they configure the device properly.Continue Reading
What role can Apple TV serve within a business?
Apple TV can do a lot more than just stream movies to your TV. Learn how this set-top device can handle numerous multimedia tasks in a business setting.Continue Reading
mobile service provider
A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.Continue Reading
How to evaluate mobile application management software
Finding the right mobile application management tool is about its features and what the organization needs to efficiently use them.Continue Reading
The story of mobile phishing through statistics
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy.Continue Reading
application sandboxing
Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.Continue Reading
When should you use Android Enterprise Essentials?
With the Android Enterprise Essentials program, organizations get simple and basic device management. However, this approach isn't a great fit for all organizations.Continue Reading
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also overlap. Knowing their differences is important.Continue Reading
Evaluating Apple Configurator and its alternatives
IT's first step to deploy mobile devices is to configure them, so organizations will have to decide if Apple Configurator is enough or if they'll need more advanced features.Continue Reading
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security.Continue Reading
How to integrate mobile threat defense and UEM such as Intune
Mobile admins can use mobile threat defense integrations with UEM to provide deeper visibility into the threat level of mobile devices and additional security controls.Continue Reading
Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategy
BYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy.Continue Reading
Samsung Quick Share will support Windows 10 use
Samsung's Quick Share file service is set to gain Windows 10 support, and it may help Samsung device users quickly transfer files for common workflows.Continue Reading
The best Windows tablets for business in 2021
There are plenty of viable Windows tablets for business tasks, but each tablet has unique features and components that purchase decision-makers will have to evaluate.Continue Reading
Evaluating top MDMs for Android and iOS
While most MDMs can handle both mobile OSes, IT professionals should be aware which platforms can handle Android or iOS better than others. Learn about these platforms below.Continue Reading
Evaluating the iPhone 12 as a business phone
Organizations that rely on mobile devices have likely considered the iPhone as a business phone for its users, so they should evaluate the latest enhancements with the iPhone 12.Continue Reading
Apple debuts multi-user iPadOS sessions for enterprise users
Shared iPad, previously exclusive to education, brings multi-user concepts to enterprise iPad use cases, and Apple admins should learn how it can support their organization.Continue Reading
Mobile device convergence brings security challenges
The trend of mobile device convergence, adding more functionality to smaller hybrid devices, is growing in intensity with the COVID-19 pandemic, and IT must be prepared for it.Continue Reading
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard.Continue Reading
Dell XPS 13 (2020) review: The best Windows 10 laptop
The Dell XPS 13 is more expensive than other Windows 10 laptops, but is it worth it? Its impeccable design, stunning display and impressive spec sheet suggest yes, at least on paper.Continue Reading
How event-driven architecture benefits mobile UX
Event-driven architecture is an approach to programming that enterprise IT professionals should understand. This approach benefits both IT and mobile users.Continue Reading
Determine 5G enterprise use cases, cost before deployment
There's a lot of hype surrounding 5G. Before getting too excited, it's important to determine the enterprise use cases, costs and what organizations must do to take advantage of 5G.Continue Reading
Evaluate the foldable mobile phone market for the enterprise
As more foldable mobile devices come to market, IT pros should familiarize themselves with the available models and evaluate if they're a worthwhile investment.Continue Reading
Guide to work-from-home tech, IT support during the pandemic
This guide provides information on remote technologies that IT teams can quickly deploy to support employees who must work from home to prevent the spread of COVID-19.Continue Reading
What Wi-Fi 6 phones and tablets can provide organizations
The latest generation of Wi-Fi technology, Wi-Fi 6, can enable improved mobile UX for workers that rely on kiosks, smartphones and tablets for their daily on-premises tasks.Continue Reading
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management.Continue Reading
Surface Duo brings a Windows Surface-Android partnership
The new Windows Surface Duo device promises a marriage of Google Android and Microsoft hardware, and organizations should learn how the device could help their mobile users.Continue Reading
Explore Android OS alternatives for enterprise use
While enterprise adoption for Android OS alternatives, IT professionals should learn about the options available so they can weigh the different features and apps available.Continue Reading
Acer Spin 5, TravelMate P6 preview: Great specs, good price
At CES 2020, the Acer Spin 5 and Acer TravelMate P6 and P2 series headlined the vendor's appearance. Acer focused its upgrades on durability, productivity and affordability.Continue Reading
Dell Latitude 9510 and XPS 13 preview: Best in business
The Dell Latitude 9510 and XPS 13 unveiled at CES 2020 redefine the business laptop, touting features like 5G, AI, impossibly long battery life, maxed out displays and more.Continue Reading
Samsung Galaxy Chromebook, Galaxy Book Flex Alpha hands-on
The Samsung Galaxy Chromebook revealed at CES promises more power and performance than competitors, while the Galaxy Book Flex Alpha is an affordable option to its predecessor.Continue Reading
HP Spectre X360 15, Elite Dragonfly hands-on preview
Upgrades to the HP Spectre X360 15 and HP Elite Dragonfly were unveiled at CES 2020, catering to the needs of business users -- but at a cost.Continue Reading
Evaluate Intune alternatives for mobility management
Intune stands out in the EMM market in part due to its incumbency as a PC management platform. IT must evaluate Intune compared to other EMM and UEM platforms' mobility controls.Continue Reading
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users.Continue Reading
Smartphone market trends elicit longer refresh cycles
Organization must follow the smartphone market trends to inform their purchase decisions. Mobile admins should tailor purchase choices to fit each desired use case.Continue Reading
8 JNUC 2019 sessions that will help iOS admins
At JNUC 2019, Apple admins gather to discuss their management practices, issues and success stories. Mobile admins who manage iPhones should look into these sessions.Continue Reading
Why organizations of any size should consider IDaaS
The risks of poor identity management are well known. Identity-as-a-service offerings can solve many identity-management-related issues. For companies that haven't yet, now is the time to get started.Continue Reading
Buy the best enterprise smartphones and tablets for your business
Constantly changing mobile device technology creates challenging decisions for enterprise buyers. Learn how to find the best smartphones and tablets for your staff.Continue Reading
8 vendors who offer enterprise mobile devices and tablets in 2019
Discover eight leading providers who sell both tablets and smartphones for business workers. Their offerings are diverse, and some are more enterprise-oriented than others.Continue Reading
How to choose the right mobile device for business
Explore three criteria to look at when evaluating which mobile device is best suited for your organization. These include ease of use, as well as security and tablets vs. smartphones.Continue Reading
How does Excel's Insert Data From Picture feature work on mobile?
The Microsoft Excel mobile app allows users to upload data through a photo. IT professionals should learn how this process works so they can test its efficacy and train users.Continue Reading
Advantages and disadvantages of mobile devices in business
Mobile devices have become a steady presence in today's workplace. Learn about mobile devices in businesses and how they can help employees work more efficiently.Continue Reading
Intune mobile device management features for Android 10, iOS 13
The Intune mobile device management features that IT can deploy differ based on which mobile OS users run. The latest versions of iOS and Android add to the list of differences.Continue Reading
What native Android encryption options should IT consider?
Android encryption has evolved over the years, and full-disk encryption isn't an option in Android 10. IT must learn the best native encryption options for managed Android devices.Continue Reading
Latest iOS vulnerability puts mobile security in the spotlight
In this Q&A, sort through all the confusion regarding Google Project Zero's report on a major iOS vulnerability and determine how it should change your security policies.Continue Reading
How will Project Mainline for Android devices help mobile IT?
Project Mainline promises to make the Android update process more segmented. This new structure allows IT to push out critical updates without risking OS compatibility issues.Continue Reading
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns.Continue Reading
Buy the right UEM system to oversee all endpoints
Explore UEM tools and how they can both secure endpoints and keep them working effectively in this fast-paced, global economy.Continue Reading
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors.Continue Reading
New Android Q features could relieve IT headaches
IT should get to know the latest Android Q features set to release with the new OS, but they also must learn about key features that Google will deprecate such as Device Admin.Continue Reading
Choose the right UEM platform with this in-depth roundup
UEM tools are essential to oversee the many endpoints that reside in companies today. Read this comprehensive roundup to learn more about the leading products on the market.Continue Reading
Compare UEM software and must-have features
UEM tools are essential to manage and secure the varying endpoints within an IT environment. Explore the major features and functions to consider and the vendors that provide them.Continue Reading
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns.Continue Reading
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market.Continue Reading
Why EMM is the key to any enterprise mobility strategy
Now is the time to start incorporating EMM into enterprise mobility strategies. Here's why EMM is important and how organizations can take advantage of its benefits.Continue Reading
Top 3 emerging mobile app development trends for 2019
These three emerging mobile app development strategies could change the way apps are developed in the future. Discover which of these methods is right for your organization.Continue Reading
Make the case for UEM tools with these compelling uses
Unified endpoint management provides companies with a single platform to oversee multiple devices. Learn more about the cost, productivity and overall business benefits.Continue Reading
Mobility management systems evolve from MDM to EMM to UEM
Driven by the cloud, evolving mobile devices, unification and the need for better security, companies are vacating the premises and embracing unified endpoint management.Continue Reading
How Apple iOS 13 device management features benefit IT
Organizations with Apple mobile devices should prepare for the new iOS 13 device management features, such as user enrollment and Managed Apple IDs for Business.Continue Reading
Discover details on unified endpoint management
With the prevalence of mobile devices in the enterprise, companies need solid technology to manage them. UEM tools consolidate all endpoints together to ensure they are secure.Continue Reading
Pros and cons of smartphone sensor data analysis
With the help of smartphone sensor data, IT can learn about its users' behaviors and improve operations and workflows, but collecting this data has some notable risks as well.Continue Reading
How to use Intune app protection without MDM enrollment
Intune app protection allows IT admins to control devices without enrolling them in an MDM or UEM platform. Here's what IT pros can do with the feature.Continue Reading
Hybrid identity management could be a method to the madness
IT departments planning to undergo a hybrid cloud migration need to think through how they're going to provide flexible and secure identity and access management to employees.Continue Reading
How the Huawei ban will affect enterprise mobility
The U.S.'s ban of business purchases of foreign telecommunications products, largely aimed at Chinese vendor Huawei, has major implications for mobile IT admins around the world.Continue Reading
Why do mobile admins need Android Enterprise management?
Google is pushing Android Enterprise management and deprecating Device Admin features. Find out why IT should fall in line and migrate to Android Enterprise.Continue Reading
Best smartphone for business use relies on many key factors
Operating systems and security protection are among the key considerations when companies select smartphones for business use. Learn more about device options and decision points.Continue Reading
Phablet vs. tablet: How can IT determine which option is best?
For mobile endpoints, IT must determine the best choice of phablet vs. tablet. IT should examine the strengths and weaknesses of each device type before making a choice.Continue Reading
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans.Continue Reading
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability.Continue Reading
How can IT consolidate UEM and IAM tools?
As UEM tools begin to add IAM features and vice versa, IT should consider ways to bridge the gap. Determine how to combine the capabilities of each tool.Continue Reading
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services.Continue Reading
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios.Continue Reading
Why UEM could overshadow the EMM market
As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect and what organizations should do.Continue Reading
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT.Continue Reading