Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
As enterprise device choice grows, so should a CYOD strategy
It's been 11 years since the iPhone came to market, but IT admins are still struggling with CYOD strategies. One reason? Choose your own device is now choose your own devices. Continue Reading
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans. Continue Reading
5 tips for iOS and Android kiosk device management
IT pros can deploy configurations for kiosk devices with mobile management tools, such as Microsoft Intune. Consider these tips to ensure kiosk devices function as intended. Continue Reading
-
Mobile deployments get flexible with Android, device as a service
Mobile device admins have plenty of choices for their mobile deployments, including OSes and device ownership plans. Get the lay of the land with this Q&A. Continue Reading
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
A quiz for Microsoft Intune admins on the tool's top features
Microsoft Intune has existed for almost a decade, and it has gone through a fair amount of changes. Test yourself on the features and functions of Intune.Continue Reading
Learn Microsoft Intune's Android device management options
IT can use Microsoft Intune management for several Android device scenarios. Intune admins must learn how to enroll each device type and Intune's limits.Continue Reading
What's driving the next-generation mobile user experience
Mobile users expect more from their employers these days. Thankfully, new technologies are making it possible for organizations to ride the latest evolution in mobile experiences.Continue Reading
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined.Continue Reading
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates.Continue Reading
-
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system.Continue Reading
Explore new iOS security features
Explore the latest features from Apple and the new iOS 12, an operating system that will give IT more control over iOS device management and security in the enterprise.Continue Reading
Understand the tools for managing Android devices in the enterprise
Over the past year, Google has released new capabilities and features to manage Android enterprise devices. IT should be aware of these recent updates for Android device management.Continue Reading
Should IT monitor mobile device usage for work-life balance?
Work-related email and other communications have spilled over into after-work hours for many employees today. But should the IT department get involved in monitoring that?Continue Reading
Explore new options for Apple enterprise device management
Apple announced many of its updates at WWDC. Learn about some enterprise management features that have gone under the radar, including Apple Business Manager.Continue Reading
How IT can manage Office 365 for mobile devices
Office 365 is a cornerstone of office work, but how should IT manage the platform for mobile users? Find strategies to manage the software effectively in the enterprise.Continue Reading
How to manage security threats to mobile devices
As mobile device security threats increase, IT administrators should know what they are up against and develop strategies to secure mobile devices from cyber attacks.Continue Reading
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
IT must seek identity management tools with AI, biometrics
The current identity management market is evolving, but it isn't yet fully formed. Discover the technologies that will change ID management and how to use them.Continue Reading
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started.Continue Reading
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities.Continue Reading
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies.Continue Reading
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first.Continue Reading
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app.Continue Reading
VMware AirWatch policy and configuration tips you might not know about
There are some under-the-radar features that IT pros can take advantage of when it comes to VMware AirWatch configuration and policy settings. Automation can also be beneficial.Continue Reading
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics.Continue Reading
Eight factors when choosing mobile application development tools
When it comes to picking out a mobile app development tool it is important to keep lifecycle management, integration, internal expertise and more in mind.Continue Reading
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail.Continue Reading
Understanding HTML5 mobile application development
Developers can turn to HTML5 to simplify the mobile app development process. HTML5 mobile apps do come with some issues though, including performance that can't match native apps.Continue Reading
Why you need mobile infrastructure
IT shops need to invest in modern mobile infrastructure to meet the growing demands of mobility in the enterprise.Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise.Continue Reading
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys.Continue Reading
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands.Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases.Continue Reading
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features.Continue Reading
BlackBerry enterprise management in focus with CEO letter, BES 10.2
On the heels of an impassioned letter from its new CEO, BlackBerry tells everyone who'll listen that it's still the go-to for EMM with a BES 10 update.Continue Reading
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies.Continue Reading
Citrix XenMobile combines MDM, MAM, file-sharing for mobile management
Citrix users say the company's unified enterprise mobility management product, XenMobile, may make it easier to deliver business applications to on-the-go users.Continue Reading
Q&A: Citrix discusses enterprise mobility management challenges, goals
Citrix discusses the company's mobile enablement strategy and how anyone with an app and Amazon Web Services can disrupt legacy technology vendors.Continue Reading
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.Continue Reading
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications.Continue Reading
Active Directory deficient for consumerization-era identity management
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough.Continue Reading
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT.Continue Reading
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets.Continue Reading
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis.Continue Reading
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.Continue Reading
Managing mobile devices smarter, not harder
Smartphones are all over the enterprise -- can you manage them? We've compiled tips, reviews and more to help you update your organization's mobile device management strategy.Continue Reading
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy.Continue Reading