- March 22, 2017
IBM MaaS360 can now take advantage of Watson machine learning. Its new Advisor tool recommends policies based on analyzed user data for IT to implement on PCs and mobile devices.
- March 21, 2017
Knox's E-FOTA feature lets IT test Android OS updates before users install them on their Samsung devices, preventing apps from breaking.
- March 17, 2017
Business users will be able to take advantage of 3D imaging technology in the Windows 10 Creators Update and the rumored iPhone 8.
- March 15, 2017
If you're trying to build a mobile app, you want mobile backend as a service on your team. Mobile backend as a service (MBaaS), which connects an app's front end to the back-end systems it needs to ...
- March 10, 2017
The next few years will see 5G networks, connected cars, AR and VR colliding with IoT. Experts discussed this future of mobility at the IDC Directions conference.
Sponsored by Palo Alto - Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More
Sponsored by Palo Alto - In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More
Sponsored by Palo Alto - The is a new breed of threat intelligence services but how can enterprise security teams use these capabilities to detect and mitigate targeted threats? See More
Sponsored by Palo Alto - The focus of most cybersecurity organizations has shifted from mass attacks to unique threats that target specific industries, specific software applications or even specific enterprises. In the vast majority of cases, it takes too long to detect, analyze and mitigate these attacks. See More
- March 07, 2017
Organizations that use Sophos desktop management are intrigued by new EMM features the company continues to add. Some may move their mobile devices to Sophos for a UEM approach.
- March 02, 2017
Apple strives to make its devices more secure for the enterprise, but its latest effort leaves things completely up to users. Users of the Apple iOS 10.3 beta are receiving push notifications ...
- February 24, 2017
Field service workers are low-hanging fruit for mobile projects. Sears Home Services used GoToAssist Seeit to reduce repair times and more.
- February 22, 2017
IT pros recognize the need to manage and secure the many mobile devices in their environments, which is one reason many want to deploy EMM this year.
- February 16, 2017
BlackBerry hasn't given up on its mobile device business, but nearly everyone else has. The company's smartphone market share dropped to zero -- 0.0482% to be exact -- in the fourth quarter of ...
- February 02, 2017
Even mobile security software sometimes falls prey to vulnerabilities. VMware this week issued a security advisory regarding vulnerabilities with its AirWatch Agent and Inbox apps for Google ...
- January 27, 2017
Concur app developers switched to Realm to add offline functionality and faster real-time synchronization to their business travel and expense mobile app.
- January 27, 2017
President Donald Trump is causing quite the stir at the White House as he continues to use his personal smartphone for some purposes. Trump still uses his "old, unsecured Android phone, to the ...
- January 27, 2017
Box rolled out an update to its collaboration and productivity tool, Box Notes, featuring a new user interface and stand-alone desktop application.
- January 18, 2017
End users want mobile apps to help with basic job functions, but the cost and time it takes IT and developers to deliver those apps leads them to do-it-yourself RMAD tools.