Mobile management
When organizations allow end-user mobile devices to perform work-related tasks and view business data, they must have the proper management practices in place. This will help mobile users perform their tasks securely and efficiently. IT teams should familiarize themselves with the management platforms and practices that support mobile devices in a business setting.
Top Stories
-
Answer
12 Dec 2024
What's the difference between jailbreaking and rooting?
To secure corporate smartphones, IT must ensure these devices have security measures in place. Jailbreaking and rooting remove these restrictions and create vulnerabilities. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
06 Dec 2024
How to troubleshoot when a hotspot is not working on Android
Troubleshooting mobile hotspots on Android devices requires IT to put in the documentation, training and best practices to help remote and hybrid users. Continue Reading
By
- 21 May 2018
-
Tip
17 May 2018
Explore options for automatic device enrollment
Enrolling mobile devices can be a hassle, especially for larger organizations. Explore these programs that can help automate the process and let IT focus on more important tasks. Continue Reading
-
News
09 May 2018
XenMobile Service a tough sell for some Citrix shops
XenMobile is now called Citrix Endpoint Management, and Citrix wants on-premises customers to move to the cloud. But some IT pros aren't ready to make the jump. Continue Reading
By -
Quiz
24 Apr 2018
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz. Continue Reading
-
Feature
19 Apr 2018
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well. Continue Reading
By -
Answer
19 Apr 2018
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help. Continue Reading
-
Opinion
06 Apr 2018
IT must seek identity management tools with AI, biometrics
The current identity management market is evolving, but it isn't yet fully formed. Discover the technologies that will change ID management and how to use them. Continue Reading
By- Jack Gold, J.Gold Associates, LLC.
-
News
30 Mar 2018
Office mobile app management evens the EMM playing field
With so many mobile users reliant on Office 365 to get work done, it was high time Microsoft and EMM vendors made app management and security easier for IT. Continue Reading
By- Alyssa Provazza, Editorial Director
-
Blog Post
09 Mar 2018
XenMobile MAM covers all bases as Citrix joins AppConfig Community
XenMobile MAM now supports AppConfig Community standards, in addition to Citrix's proprietary MDX toolkit and Office 365 MAM through the Intune Graph API. Continue Reading
By -
Guide
06 Mar 2018
Explore the features of unified endpoint management
UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do their research. Continue Reading
-
Feature
06 Mar 2018
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started. Continue Reading
-
Tip
23 Feb 2018
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it. Continue Reading
-
Tip
08 Feb 2018
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first. Continue Reading
By -
Tip
05 Feb 2018
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
17 Jan 2018
A roundup of the leading EMM providers in today's market
Just as identifying the need for EMM is important, so is selecting the right vendor. Here's a rundown of leading EMM vendors and an in-depth peek into the products they offer. Continue Reading
-
Feature
15 Jan 2018
Compare these top EMM providers and their potential impact
With all the EMM products available, companies must know the major features that they offer and how the players stack up against each other. Continue Reading
-
Feature
12 Jan 2018
Key factors to consider when making an EMM software purchase
Enterprises must look at many organizational factors when purchasing EMM software. Learn the most important decision points to choose the best EMM platform for any enterprise. Continue Reading
-
Feature
11 Jan 2018
The big business functions of EMM software
Solid EMM software will manage and monitor a company's mobile device activity. Understand why organizations need EMM software and what constitutes a successful plan. Continue Reading
-
Feature
10 Jan 2018
Learn what an EMM platform can achieve in the enterprise
Mobile device management is no longer enough to secure enterprise data. In the wake of BYOD and IoT, companies need EMM, but they must know its capabilities and challenges beforehand. Continue Reading
-
Definition
21 Mar 2017
VMware AirWatch
VMware AirWatch is an enterprise mobility software provider based in Atlanta. AirWatch, a division of virtualization vendor VMware, provides technologies that help IT administrators deploy, secure and manage mobile devices, applications and data, as well as Windows 10 and Apple Mac computers. Continue Reading
By -
News
21 Mar 2017
Samsung Knox gives IT control over Android OS updates
Knox's E-FOTA feature lets IT test Android OS updates before users install them on their Samsung devices, preventing apps from breaking. Continue Reading
By- Ramin Edmond, News Writer
-
Opinion
08 Dec 2016
The complete guide to mobile application management: Understanding different MAM techniques
MAM is essential, yet challenging and confusing; this series of articles covers everything you need to know. Part 2 takes a deep look at AppConfig MAM, stand alone MAM, and other MAM techniques. Continue Reading
By -
Tip
11 Oct 2016
VMware AirWatch policy and configuration tips you might not know about
There are some under-the-radar features that IT pros can take advantage of when it comes to VMware AirWatch configuration and policy settings. Automation can also be beneficial. Continue Reading
By- Ramin Edmond, News Writer
-
Feature
04 Jun 2015
The good, bad and ugly of Outlook apps for iOS and Android
Outlook mobile applications for iOS and Android are here, but is that a good thing? Take a look at why users will love them and why IT might hesitate to endorse them. Continue Reading
By- Eddie Lockhart, Site Editor
-
Tip
22 May 2015
Weighing pros and cons of mobile application management
Rather than focusing on gaining access to users' devices, MAM puts the power squarely in IT's hands to protect mobile applications on any device. Continue Reading
-
Feature
08 May 2015
Why you need mobile infrastructure
IT shops need to invest in modern mobile infrastructure to meet the growing demands of mobility in the enterprise. Continue Reading
By -
Tip
30 Apr 2015
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Tip
30 Mar 2015
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process. Continue Reading
-
Feature
24 Mar 2015
Create apps that focus on end-user needs first
Many companies approach mobile app development backward and don't even realize it. Prioritizing user needs over business needs will breed better results. Continue Reading
By -
News
19 Jan 2015
Affordable Apple MDM option emerges for IT on a budget
One real estate services company needed device management and found JAMF's Bushel to be a cost-effective MDM for its Apple devices. Continue Reading
-
News
21 Nov 2014
BlackBerry pins enterprise future on BES12, partnerships
BlackBerry's return to QWERTY keyboard devices and improvements to BES12 are steps in the right direction, but is it too little, too late for many IT shops that have already moved on? Continue Reading
-
News
27 Aug 2014
VMware marries AirWatch, Horizon 6 in new Workspace Suite
After months of speculation, VMware Workspace Suite brings together VMware's EUC pieces in one place, not long after rival Citrix launched a similar platform. Continue Reading
-
Tip
12 Aug 2014
Google Glass at Work could make some jobs easier
With Glass for Work, Google aims to overcome the challenges the "smart glasses" have faced in the consumer marketplace. The new focus on enterprise could help field workers, manufacturers and engineers get more done hands-free. Continue Reading
-
Tip
19 May 2014
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading
By- Lisa Phifer, Core Competence
-
News
16 May 2014
BlackBerry 10 open APIs extend MDM support without BES
BlackBerry's move to open its BlackBerry 10 OS APIs to other MDM tools is a welcome one for IT shops that don't want to stick with BES. Continue Reading
-
Tip
12 May 2014
Five alternatives to Microsoft for mobile office applications
There are plenty of alternatives to Microsoft Office out there. Check out other mobile office apps that help you view and edit docs. Continue Reading
-
Feature
09 Apr 2014
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them? Continue Reading
-
Tip
12 Feb 2014
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases. Continue Reading
-
Feature
04 Sep 2013
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds. Continue Reading
By- Margaret Jones, Executive Editor
-
News
06 Aug 2013
BMC's Partnerpedia acquisition to yield unified enterprise app store
BMC, RES Software and other vendors offer enterprise app stores akin to Apple's Mac App Store to deliver apps and services to corporate employees . Here's how. Continue Reading
By- James Furbush, TechTarget
-
Tip
12 Jun 2013
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies. Continue Reading
By -
News
24 May 2013
Citrix XenMobile combines MDM, MAM, file-sharing for mobile management
Citrix users say the company's unified enterprise mobility management product, XenMobile, may make it easier to deliver business applications to on-the-go users. Continue Reading
By -
Quiz
05 Apr 2013
BYOD challenges and advantages: Test your knowledge
Like many things in IT, there are BYOD challenges and advantages. Take this quiz and see how much you know about the pros and cons. Continue Reading
By- Margaret Jones, Executive Editor
-
Feature
02 Apr 2013
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience. Continue Reading
By- Margaret Jones, Executive Editor
-
News
15 Mar 2013
Q&A: Citrix discusses enterprise mobility management challenges, goals
Citrix discusses the company's mobile enablement strategy and how anyone with an app and Amazon Web Services can disrupt legacy technology vendors. Continue Reading
By- James Furbush, TechTarget
-
Tip
20 Nov 2012
Top five mobile application vulnerabilities
Devices are often blamed for insecurities, but mobile app vulnerabilities are insidious. Make sure employees use common sense when they download apps. Continue Reading
By -
News
06 Nov 2012
ITSM tools enter the consumerization era
BMC's MyIT app aims to bridge the gap between traditional ITSM tools and today's empowered, mobile end users. Continue Reading
By- James Furbush, TechTarget
-
Tip
13 Apr 2012
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
18 Jan 2010
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide the customer toward the right mobile operating system. Continue Reading
-
Feature
16 Jun 2008
Detecting rogue mobile devices on your network
Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to detect and restrict mobile access, complemented by IPS to spot anything that slips through the cracks. Such techniques can be effective, but today's mobile devices can present new challenges that deserve further attention. Lisa Phifer discusses the challenges being introduced by today's increasingly diverse mobile devices and discusses some emerging techniques to deal with them. Continue Reading
-
Feature
28 May 2008
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy. Continue Reading