Tips
Tips
-
Create a mobile BYOD policy for the coronavirus pandemic
The COVID-19 pandemic is forcing organizations to support remote work whenever possible. Organization can follow a few key steps to enable productive remote work on mobile devices. Continue Reading
-
Understanding the features of Android enterprise device management
Don't get overwhelmed when managing Android devices in the enterprise. Check out this cheat sheet to understand and use features that make device management a breeze. Continue Reading
-
7 enterprise policies that enhance mobile user experience
Mobile admins must prioritize the mobile user experience they provide on their mobile fleet by deploying policies such as IT approving app permissions and single sign-on. Continue Reading
-
5 strategic steps to blunt mobile device security threats
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it. Continue Reading
-
How to configure Outlook on mobile devices with Intune
Intune admins must know how to enable mobile users' needs, including having quick access to Outlook. Learn the five steps that IT must take to configure Outlook on mobile devices. Continue Reading
-
Standardize mobile UI with Microsoft Launcher for Android
The Microsoft Launcher for Android functionality in Intune allows IT to provide a single UI for its Android devices. IT can configure it with JSON or Configuration Designer data. Continue Reading
-
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management. Continue Reading
-
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed. Continue Reading
-
Surface Duo brings a Windows Surface-Android partnership
The new Windows Surface Duo device promises a marriage of Google Android and Microsoft hardware, and organizations should learn how the device could help their mobile users. Continue Reading
-
Explore Android OS alternatives for enterprise use
While enterprise adoption for Android OS alternatives, IT professionals should learn about the options available so they can weigh the different features and apps available. Continue Reading
-
8 MobileIron features that EMM admins should know
IT professionals should make the most of their EMM platform by learning the potentially overlooked features. MobileIron admins should learn about the following eight features. Continue Reading
-
4 factors that should shape a BYOD mobile policy
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
-
Enterprise wearables bring benefits, management challenges
Enterprise mobility isn't just about smartphones and tablets. Wearable device adoption is growing, so IT should be ready to support this dynamic category of mobile devices. Continue Reading
-
How to install root CA certificates on iPhones and iPads
Apple iPads and iPhones can connect securely to enterprise networks, but IT admins need to install root certificates or CA certificates to the devices first. Continue Reading
-
Evaluate Intune alternatives for mobility management
Intune stands out in the EMM market in part due to its incumbency as a PC management platform. IT must evaluate Intune compared to other EMM and UEM platforms' mobility controls. Continue Reading
-
Deploy kiosk devices with the Managed Home Screen Android app
The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best Managed Home Screen Android management options. Continue Reading
-
Develop a strong smartphone policy for the enterprise
Organizations with managed mobile users need to develop a smartphone policy, on everything from data use to app installation, to ensure security and smooth business processes. Continue Reading
-
Google OEM config program enables quick updates to EMM
Google's OEM Config program incentivizes Android smartphone OEMs to help EMM vendors quickly support device-specific management features by uploading APIs to the Google Play Store. Continue Reading
-
How to manage Office 365 mobile apps for business
Microsoft Office 365 applications allow users to send emails and edit numerous types of documents, but the mobile apps present a number of adoption issues that IT should learn about. Continue Reading
-
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Continue Reading
-
Intune mobile device management features for Android 10, iOS 13
The Intune mobile device management features that IT can deploy differ based on which mobile OS users run. The latest versions of iOS and Android add to the list of differences. Continue Reading
-
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns. Continue Reading
-
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors. Continue Reading
-
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns. Continue Reading
-
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data. Continue Reading
-
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for. Continue Reading
-
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps. Continue Reading
-
Apple and Google simplify BYOD management with new OSes
IT must weigh user privacy and endpoint security when it shapes its BYOD policies. Luckily, new features in iOS 13 and Android Q make this balance easier for IT to strike. Continue Reading
-
Pros and cons of smartphone sensor data analysis
With the help of smartphone sensor data, IT can learn about its users' behaviors and improve operations and workflows, but collecting this data has some notable risks as well. Continue Reading
-
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
-
How to use Intune app protection without MDM enrollment
Intune app protection allows IT admins to control devices without enrolling them in an MDM or UEM platform. Here's what IT pros can do with the feature. Continue Reading
-
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security. Continue Reading
-
Navigate Intune app deployment for mobile devices
With the right Intune app deployment methods, IT can manage its Android and iOS users' apps, but the practices are different depending on the OS and the type of mobile apps. Continue Reading
-
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors. Continue Reading
-
Smartphone lifecycle plans are crucial in today's workplace
When IT creates a smartphone lifecycle policy, it must factor in its available resources and its users' needs. Learn why these policies are necessary and how IT should design them. Continue Reading
-
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management. Continue Reading
-
How AI chatbots for enterprise use can help mobile admins
Mobile chatbots that include AI technologies can help organizations simplify user and IT workflows. Learn exactly how these chatbots can fit within a mobility management strategy. Continue Reading
-
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are. Continue Reading
-
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability. Continue Reading
-
5 tips for iOS and Android kiosk device management
IT pros can deploy configurations for kiosk devices with mobile management tools, such as Microsoft Intune. Consider these tips to ensure kiosk devices function as intended. Continue Reading
-
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
-
Use Android Enterprise to lock down mobile devices
IT can integrate Android controls with EMM tools via APIs from Google's Android Enterprise program. These EMM capabilities can help IT manage updates and secure devices. Continue Reading
-
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
-
Learn Microsoft Intune's Android device management options
IT can use Microsoft Intune management for several Android device scenarios. Intune admins must learn how to enroll each device type and Intune's limits. Continue Reading
-
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services. Continue Reading
-
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios. Continue Reading
-
Why Linux on Samsung DeX creates challenges for IT
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management. Continue Reading
-
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively. Continue Reading
-
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
-
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use. Continue Reading
-
A developer's guide to mobile app personalization
User experience for a mobile app can improve significantly with the use of personalization. Learn about the benefits of app personalization and how to use it. Continue Reading
-
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined. Continue Reading
-
Prepare for the death of Intune's hybrid MDM
Microsoft is making some changes that could affect mobile device management with Intune. Here's how admins can stay prepared and reap the benefits of the stand-alone service. Continue Reading
-
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates. Continue Reading
-
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices. Continue Reading
-
Plan for the future of 5G in the enterprise
5G networks will bring speed and reduced latency to mobile business users that can take advantage of it. Get prepared for other changes that 5G will bring to the enterprise. Continue Reading
-
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
-
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system. Continue Reading
-
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps. Continue Reading
-
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process. Continue Reading
-
How to avert mobile device security threats
From man-in-the-middle attacks to malware, mobile devices are susceptible to an array of threats. Here's how to prevent them from infiltrating the business. Continue Reading
-
How middleware platforms can benefit mobile apps
Organizations that build mobile apps with a lot of integrations with back-end services should consider middleware. But first, be aware of these pros and cons. Continue Reading
-
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management. Continue Reading
-
Combat mobile device security threats at home and abroad
Employees that travel for business face a higher risk of a mobile security breach. Take these steps to ensure that your mobile device fleet is secure. Continue Reading
-
Explore new options for Apple enterprise device management
Apple announced many of its updates at WWDC. Learn about some enterprise management features that have gone under the radar, including Apple Business Manager. Continue Reading
-
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle. Continue Reading
-
How to avoid wasting time in a mobile app development project
A tedious, drawn-out app development process can frustrate everyone involved. Follow these five tips and tricks to ensure that developers don't waste time. Continue Reading
-
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud. Continue Reading
-
Explore new features of Android Pie
Google released the public beta of Android's latest operating system, Android Pie, which includes new features for the enterprise. Discover what this latest version has to offer. Continue Reading
-
Explore options for automatic device enrollment
Enrolling mobile devices can be a hassle, especially for larger organizations. Explore these programs that can help automate the process and let IT focus on more important tasks. Continue Reading
-
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics. Continue Reading
-
Be prepared to handle a mobile security breach
When it comes to cybersecurity, mobile security often falls by the wayside. Discover these techniques to prepare for a mobile security incident should it affect your organization. Continue Reading
-
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps. Continue Reading
-
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it. Continue Reading
-
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process. Continue Reading
-
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies. Continue Reading
-
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first. Continue Reading
-
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise. Continue Reading
-
Pros and cons of a multi-factor authentication mobile app
MFA can improve the security of an app by using a layered approach rather than one that relies on passwords alone. To know whether it's right for your app, weigh its pros and cons. Continue Reading
-
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision. Continue Reading
-
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app. Continue Reading
-
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
VMware AirWatch policy and configuration tips you might not know about
There are some under-the-radar features that IT pros can take advantage of when it comes to VMware AirWatch configuration and policy settings. Automation can also be beneficial. Continue Reading
-
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
-
Eight factors when choosing mobile application development tools
When it comes to picking out a mobile app development tool it is important to keep lifecycle management, integration, internal expertise and more in mind. Continue Reading
-
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail. Continue Reading
-
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading
-
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools. Continue Reading
-
Weighing pros and cons of mobile application management
Rather than focusing on gaining access to users' devices, MAM puts the power squarely in IT's hands to protect mobile applications on any device. Continue Reading
-
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process. Continue Reading
-
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps. Continue Reading
-
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box. Continue Reading
-
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
-
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat. Continue Reading
-
Google Glass at Work could make some jobs easier
With Glass for Work, Google aims to overcome the challenges the "smart glasses" have faced in the consumer marketplace. The new focus on enterprise could help field workers, manufacturers and engineers get more done hands-free. Continue Reading
-
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform. Continue Reading
-
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading
-
Five alternatives to Microsoft for mobile office applications
There are plenty of alternatives to Microsoft Office out there. Check out other mobile office apps that help you view and edit docs. Continue Reading
-
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases. Continue Reading