Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
How to troubleshoot when a hotspot is not working on Android
Troubleshooting mobile hotspots on Android devices requires IT to put in the documentation, training and best practices to help remote and hybrid users. Continue Reading
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
How to fix an iPhone Personal Hotspot that's not working
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT must know how to avoid and fix iPhone hotspot issues for remote work. Continue Reading
-
How to conduct a mobile app security audit
To keep corporate and user data safe, IT must continuously ensure mobile app security. Mobile application security audits are a helpful tool to stay on top of data protection. Continue Reading
How to choose an Android Enterprise enrollment method
When setting up Android Enterprise devices, there are several enrollment methods IT should consider. Admins should learn how to determine which method, or methods, to use. Continue Reading
8 mobile app development challenges for the enterprise
Despite the growth of mobile application development in the enterprise, developers must still navigate unique challenges to deliver apps to mobile users.Continue Reading
How to set up Apple Pay for a business
Setting up Apple Pay is a simple process, but IT decision-makers should understand the considerations that come with it and how it varies for organizations of different sizes.Continue Reading
How do personal hotspots work for remote work?
A personal hotspot can be a valuable element of a remote work strategy, but IT teams must understand how they work and what management challenges they present.Continue Reading
Does a hotspot work when a mobile device has no service?
Cellular service is necessary for establishing a hotspot connection. IT must know what to do when remote users are dealing with both Wi-Fi and service issues.Continue Reading
How does enterprise file management in iOS work?
It's important to ensure that files are secure and easy to work with on enterprise mobile devices. In iOS, the Files app is a key tool for personal and corporate file management.Continue Reading
-
How small businesses can pick the right mobile devices
To cash-strapped SMBs, deploying mobile devices may seem excessive. However, mobile devices are valuable tools to increase communication and productivity for business users.Continue Reading
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems.Continue Reading
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them.Continue Reading
How can Android Enterprise Recommended improve user privacy?
To simultaneously tackle the issues of mobile user privacy and security, IT can deploy Android Enterprise Recommended devices and partition them with a dedicated API.Continue Reading
How can mobile app virtualization improve BYOD app access?
Mobile app virtualization isn't a new technology, but the latest generations of smartphones have made this technology more viable for everyday use for enterprise mobile users.Continue Reading
How can IT address smartphone battery drain and mobile UX?
Here are smartphone battery tips that admins should keep in mind. Find out all the factors that could affect the battery life and how IT can mitigate smartphone battery drain.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading
How to install root CA certificates on iPhones and iPads
Apple iPads and iPhones can connect securely to enterprise networks, but IT admins need to install root certificates or CA certificates to the devices first.Continue Reading
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise.Continue Reading
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market.Continue Reading
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process.Continue Reading
How can zero-touch enrollment help Android admins?
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can benefit from this method.Continue Reading
Which Android Device Admin APIs will Google deprecate?
With the release of Android Q, Google will discontinue several Android Device Admin APIs. Learn which Android management APIs will be deprecated and which will remain.Continue Reading
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment.Continue Reading
Use Android Enterprise to lock down mobile devices
IT can integrate Android controls with EMM tools via APIs from Google's Android Enterprise program. These EMM capabilities can help IT manage updates and secure devices.Continue Reading
4 mobile security best practices for enterprise IT
Organizations should look to update their mobile security best practices due to COVID-19. IT must incorporate BYOD access to corporate data and other new mobile capabilities.Continue Reading
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios.Continue Reading
Why Linux on Samsung DeX creates challenges for IT
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management.Continue Reading
How can IT use the OAuth 2.0 protocol for iOS 12 devices?
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too.Continue Reading
What problems occur with Intune app protection for Outlook?
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction.Continue Reading
Prepare for the death of Intune's hybrid MDM
Microsoft is making some changes that could affect mobile device management with Intune. Here's how admins can stay prepared and reap the benefits of the stand-alone service.Continue Reading
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates.Continue Reading
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions.Continue Reading
Combat mobile device security threats at home and abroad
Employees that travel for business face a higher risk of a mobile security breach. Take these steps to ensure that your mobile device fleet is secure.Continue Reading
How to avoid wasting time in a mobile app development project
A tedious, drawn-out app development process can frustrate everyone involved. Follow these five tips and tricks to ensure that developers don't waste time.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities.Continue Reading
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies.Continue Reading
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security.Continue Reading
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases.Continue Reading
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features.Continue Reading
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data.Continue Reading
Limiting mobile bandwidth consumption to improve network performance
When a lot of devices access your network, the network slows down. Adding WAPs and upgrading the LAN can help you limit bandwidth consumption.Continue Reading
How cloud storage and collaboration are changing email communications
Email communications aren't dead, but social networking, cloud storage and collaboration tools have made it easier for employees to work together.Continue Reading
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies.Continue Reading
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets.Continue Reading
How iPhone encryption and data protection work
With Apple's iPhone encryption and data protection, you can take advantage of strong security. But make sure users enable the right iOS data encryption settings.Continue Reading
Surface RT review: The good, the bad and the ugly
The Surface RT tablet comes with Office and has good battery life, but it has some drawbacks, too. This Surface RT review explains the pros and cons.Continue Reading
Comparing mobile operating systems and application environments
Each mobile operating system has a different application environment, but that could be more of an advantage for businesses than a detriment.Continue Reading
Top five mobile application vulnerabilities
Devices are often blamed for insecurities, but mobile app vulnerabilities are insidious. Make sure employees use common sense when they download apps.Continue Reading
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications.Continue Reading
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT.Continue Reading
Business email security and the risks of personal Gmail forwarding
Business email security might not be on employees’ minds when they forward corporate mail to more user-friendly Gmail accounts, so IT should take steps to protect corporate data.Continue Reading
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices.Continue Reading
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets.Continue Reading
Meeting technical requirements for mobile health care deployments
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.Continue Reading
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis.Continue Reading
Does a mobile VDI platform make sense for your users?
Mobile VDI isn't always a good fit. Ask these five questions to determine whether a mobile VDI platform makes sense for your users.Continue Reading
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it.Continue Reading
Mobile patching is No. 1 challenge of mobile device security
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security.Continue Reading
Accessing mobile unified communications with virtual desktops
Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified ...Continue Reading
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network ...Continue Reading
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide...Continue Reading
WiMAX devices
WiMAX devices will become more readily available as carriers deploy widespread WiMAX service.Continue Reading
700 MHz -- Why is it so valuable?
The 700 MHz wireless spectrum auction is causing a lot of excitement, yet the reasons why can be obscure -- Paul DeBeasi explains its importance and how it works.Continue Reading
Mobile service providers: How to choose the right one
Finding the "right" mobile service provider might be an abstract, theoretical concept, but picking the right one for your organization shouldn't be too difficult. Here, Craig Mathias outlines some key elements to guide you in selecting the right ...Continue Reading
iPhone in the enterprise: Can it replace a BlackBerry?
How will the iPhone fit in the enterprise? We challenged our expert to put the iPhone through a series of tests to see how well it integrates, whether it's manageable, and whether its email, calendar and contact features can replace a BlackBerry.Continue Reading
Mobile data services -- A checklist of considerations
Analyzing and selecting a mobile data service can be a daunting task. This tip provides a checklist of the major factors to consider when evaluating mobile data services (GSM, CDMA and WiMAX).Continue Reading
Defining mobility solutions
Mobile solutions fall into one of three distinct philosophical categories and the solution you apply to your enterprise depends to some extent on the particular mobility needs of those involved. Craig Mathias explores three desktop replacement ...Continue Reading