Tips
Tips
-
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features. Continue Reading
-
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
-
Limiting mobile bandwidth consumption to improve network performance
When a lot of devices access your network, the network slows down. Adding WAPs and upgrading the LAN can help you limit bandwidth consumption. Continue Reading
-
How cloud storage and collaboration are changing email communications
Email communications aren't dead, but social networking, cloud storage and collaboration tools have made it easier for employees to work together. Continue Reading
-
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies. Continue Reading
-
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading
-
How iPhone encryption and data protection work
With Apple's iPhone encryption and data protection, you can take advantage of strong security. But make sure users enable the right iOS data encryption settings. Continue Reading
-
Surface RT review: The good, the bad and the ugly
The Surface RT tablet comes with Office and has good battery life, but it has some drawbacks, too. This Surface RT review explains the pros and cons. Continue Reading
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company. Continue Reading
-
Comparing mobile operating systems and application environments
Each mobile operating system has a different application environment, but that could be more of an advantage for businesses than a detriment. Continue Reading
-
Top five mobile application vulnerabilities
Devices are often blamed for insecurities, but mobile app vulnerabilities are insidious. Make sure employees use common sense when they download apps. Continue Reading
-
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications. Continue Reading
-
How to develop a monitoring system for mobile cloud-based applications
If your mobile workforce uses cloud-based applications to work from their smartphones and tablets, consider a monitoring system to ensure the apps are working. Continue Reading
-
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT. Continue Reading
-
Business email security and the risks of personal Gmail forwarding
Business email security might not be on employees’ minds when they forward corporate mail to more user-friendly Gmail accounts, so IT should take steps to protect corporate data. Continue Reading
-
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices. Continue Reading
-
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets. Continue Reading
-
Meeting technical requirements for mobile health care deployments
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
-
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
-
Does a mobile VDI platform make sense for your users?
Mobile VDI isn't always a good fit. Ask these five questions to determine whether a mobile VDI platform makes sense for your users. Continue Reading
-
Mobile patching is No. 1 challenge of mobile device security
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
-
Accessing mobile unified communications with virtual desktops
Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified ... Continue Reading
-
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network ... Continue Reading
-
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide... Continue Reading
-
WiMAX devices
WiMAX devices will become more readily available as carriers deploy widespread WiMAX service. Continue Reading
-
700 MHz -- Why is it so valuable?
The 700 MHz wireless spectrum auction is causing a lot of excitement, yet the reasons why can be obscure -- Paul DeBeasi explains its importance and how it works. Continue Reading
-
Mobile service providers: How to choose the right one
Finding the "right" mobile service provider might be an abstract, theoretical concept, but picking the right one for your organization shouldn't be too difficult. Here, Craig Mathias outlines some key elements to guide you in selecting the right ... Continue Reading
-
iPhone in the enterprise: Can it replace a BlackBerry?
How will the iPhone fit in the enterprise? We challenged our expert to put the iPhone through a series of tests to see how well it integrates, whether it's manageable, and whether its email, calendar and contact features can replace a BlackBerry. Continue Reading
-
Mobile data services -- A checklist of considerations
Analyzing and selecting a mobile data service can be a daunting task. This tip provides a checklist of the major factors to consider when evaluating mobile data services (GSM, CDMA and WiMAX). Continue Reading
-
Defining mobility solutions
Mobile solutions fall into one of three distinct philosophical categories and the solution you apply to your enterprise depends to some extent on the particular mobility needs of those involved. Craig Mathias explores three desktop replacement ... Continue Reading