Ask the Experts
Ask the Experts
-
How can mobile app virtualization improve BYOD app access?
Mobile app virtualization isn't a new technology, but the latest generations of smartphones have made this technology more viable for everyday use for enterprise mobile users. Continue Reading
-
What new Android 11 features should IT know about?
Android 11's public beta has revealed several new features that IT admins should take note of, such as incremental app installs and more detailed information on app data access. Continue Reading
-
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
How does the aggressive iOS 13 RAM management affect UX?
Apple's iOS 13 comes with RAM management that may terminate mobile apps that aren't in use. Apple has somewhat addressed this with updates, but some of the core issues remain. Continue Reading
-
How can IT address smartphone battery drain and mobile UX?
Here are smartphone battery tips that admins should keep in mind. Find out all the factors that could affect the battery life and how IT can mitigate smartphone battery drain. Continue Reading
-
How can IT manage Android Things devices in the enterprise?
The Android Things program provides APIs that link atypical Android devices to Android smartphone management tools, so mobile admins must learn to manage Android Things devices. Continue Reading
-
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users. Continue Reading
-
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well. Continue Reading
-
How does Excel's Insert Data From Picture feature work on mobile?
The Microsoft Excel mobile app allows users to upload data through a photo. IT professionals should learn how this process works so they can test its efficacy and train users. Continue Reading
-
What native Android encryption options should IT consider?
Android encryption has evolved over the years, and full-disk encryption isn't an option in Android 10. IT must learn the best native encryption options for managed Android devices. Continue Reading
-
How will Project Mainline for Android devices help mobile IT?
Project Mainline promises to make the Android update process more segmented. This new structure allows IT to push out critical updates without risking OS compatibility issues. Continue Reading
-
What are the benefits of Apple Business Manager?
IT should learn the benefits of Apple Business Manager to decide if the program's configuration and monitoring services are a worthwhile supplement to existing MDM or EMM tools. Continue Reading
-
How do Intune and mobile threat defense tools integrate?
Mobile admins can use Microsoft Intune mobile threat defense integrations to provide deeper visibility into the threat level of mobile devices and additional security controls. Continue Reading
-
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
-
How can Android Enterprise Recommended improve user privacy?
To tackle the issues of mobile user privacy and security at the same time, IT can deploy Android Enterprise Recommended devices and partition them with an Android Enterprise API. Continue Reading
-
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process. Continue Reading
-
How can zero-touch enrollment help Android admins?
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can benefit from this method. Continue Reading
-
Why do mobile admins need Android Enterprise management?
Google is pushing Android Enterprise management and deprecating Device Admin features. Find out why IT should fall in line and migrate to Android Enterprise. Continue Reading
-
Which Android Device Admin APIs will Google deprecate?
With the release of Android Q, Google will discontinue several Android Device Admin APIs. Learn which Android management APIs will be deprecated and which will remain. Continue Reading
-
Phablet vs. tablet: How can IT determine which option is best?
For mobile endpoints, IT must determine the best choice of phablet vs. tablet. IT should examine the strengths and weaknesses of each device type before making a choice. Continue Reading
-
How can IT consolidate UEM and IAM tools?
As UEM tools begin to add IAM features and vice versa, IT should consider ways to bridge the gap. Determine how to combine the capabilities of each tool. Continue Reading
-
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
-
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
-
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks. Continue Reading
-
How can IT use the OAuth 2.0 protocol for iOS 12 devices?
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too. Continue Reading
-
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
-
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively. Continue Reading
-
What problems occur with Intune app protection for Outlook?
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction. Continue Reading
-
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
-
What are the use cases for blockchain in mobile apps?
Blockchain can bring a variety of benefits to enterprise mobile apps. Explore some use cases before integrating this secure technology into mobile apps. Continue Reading
-
How can IT determine the optimal smartphone lifespan?
Smartphones don't last forever. Here's how organizations can determine their lifecycles to avoid security issues and keep smartphones functioning at peak performance. Continue Reading
-
How can organizations calculate the TCO of mobile devices?
There are a variety of factors to evaluate when determining the true cost of mobile devices in an organization. Unpack these factors to find the TCO. Continue Reading
-
What do the major mobile OSes offer for enterprise features?
Mobile devices are now commonplace in the enterprise. Discover which vendors are touting enterprise-ready features and which are reluctant to jump into the enterprise realm. Continue Reading
-
How can AI in mobile technology improve security?
AI can help IT better detect mobile security threats, so determine how to take advantage of this nascent technology. Prep for AI-based systems to enter the mobile security market. Continue Reading
-
Review Office 365 mobile app updates
As Microsoft retires some of its mobile messaging-related services and improves others, the future of its mobile presence could be in one app -- the Outlook mobile app. Continue Reading
-
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help. Continue Reading
-
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities. Continue Reading
-
What are the advantages of rapid application development?
RMAD requires less know-how, but still reduces the costs and risks typically involved in a traditional app build. Delve into the advantages of adopting RMAD products. Continue Reading
-
Are mobile app development costs worth it?
Is it too expensive to build an enterprise mobile app? To make the decision for your organization, find out how to break down the costs and the benefits. Continue Reading
-
What are the best iOS 11 enterprise features?
Changes to how IT can enroll Apple devices in mobile device management and how users can multitask will provide a boost to iOS 11 in the enterprise. Continue Reading
-
How can IT create a diverse endpoint management strategy?
IT admins have to keep up with both the growing technology outside and the endpoint diversity inside the organization. But they can take some simple measures to manage devices. Continue Reading
-
How should you start the process of mobile app development?
IT teams must go into the mobile app development process with a strong plan for implementation. Know which tools and types of apps work best for the organization ahead of time. Continue Reading
-
What can IT expect from the post-app era?
The post-app era doesn't mean apps are going away; on the contrary, mobile apps are simply evolving to perform more than one function. The shift should be on IT's radar. Continue Reading
-
Is choosing non-native over native mobile apps risky for developers?
What's more risky: developing cross-platform or native mobile apps? One expert chooses sides in the native vs. non-native/cross-platform mobile apps debate. Continue Reading
-
How can IT tackle the top mobile security issues?
With so many mobile security challenges around the bend, admins may worry they'll never see the finish line. IT can achieve security success by staying ahead of the curve. Continue Reading
-
How can IT manage emerging mobile technology?
IT admins can get overwhelmed or undermined when it comes to the emerging mobile technology arriving in businesses. To stay on top of trends, it's crucial to plan ahead. Continue Reading
-
How can IT select the best business tablets?
Choosing business tablets doesn't have to be a chore, but it does take consideration. IT must know what tasks employees need to do before deciding if tablets can bear the load. Continue Reading
-
Why do companies fear enterprise mobility adoption?
Mobility's the future of the enterprise, but going from old to new ways for IT becomes more complex every day. Organizations must embrace going mobile so business can move forward. Continue Reading
-
Why is a layered enterprise mobile security strategy best?
With security hazards around every corner, IT must know where to draw lines of defense. A best practice is implementing layered mobile security. Continue Reading
-
What is the right way for IT to manage mobile web apps?
Mobile web applications are a convenient way for organizations to offer business apps, but they come with their own set of management issues for IT to tackle. Continue Reading
-
How has Android Nougat security improved?
As Android Nougat starts hitting devices, some IT admins may be dreading the rollout. But new and improved security features make the new OS much more palatable. Continue Reading
-
What's new with HTML5 mobile app development?
HTML5 makes mobile app development easier. Updates to the language such as audio and video improvements and better integration with JavaScript make it even more appealing. Continue Reading
-
Should IT allow Android users to sideload apps?
Android users can sideload apps outside of the Google Play Store, but these apps aren't screened for malware like commercial apps are. IT must urge users to proceed with caution. Continue Reading
-
Should IT guarantee BYOD privacy for employees?
The business world is full of employees using their personal mobile devices for work, but many companies still struggle with how much privacy to grant BYOD users. Continue Reading
-
What are the top Android phones for the enterprise?
With all of the Android phones on the market, it can be hard to tell which ones are good fits for businesses. IT should make sure they can use EMM tools to control some features. Continue Reading
-
Are BlackBerry Android phones a fit for the enterprise?
With a new BlackBerry Android phone, the flailing company hopes to turn its sinking ship around. Continue Reading
-
Do I need a mobile backend as a service provider to develop mobile apps?
The MBaaS approach can spare mobile app developers a few headaches on the back end, so they can focus on the front end and user experience -- but that depends on the app. Continue Reading
-
Can tablets replace laptops in the enterprise?
They're smaller, lighter, more portable and can do just about everything that laptops can do. But enterprise tablets haven't replaced PCs -- at least not yet. Continue Reading
-
What are mobile app development platforms' pros and cons?
Codeless mobile app development platforms can save time, money and resources. But with limited customization options, they shouldn't be the only tool in a developer's toolbox. Continue Reading
-
Should I build an HTML5 mobile app?
When it comes to mobile app development, there are three basic options: native apps, HTML5 apps or a hybrid approach. One method comes out on top for developers on a deadline. Continue Reading
-
Are Apple Watch business apps worth it?
Need to send an email, check your flight's status or get ready for a presentation? You can do it all on your smartwatch, thanks to a slew of Apple Watch business apps. Continue Reading
-
Which mobile apps for business should I deploy first?
Admins on the verge of deploying enterprise mobile apps have numerous options, from note-taking and social media apps to ones that offer storage and conferencing capabilities. Continue Reading
-
How do I get started with Android device management?
New and improved management features have made Android devices more suitable for enterprise use, and API and EMM tools can streamline the device management process. Continue Reading
-
What's the next big thing in the wearable device market?
With fashion-forward smartwatches, connected jeans and virtual reality headsets launching this year, it looks like the wearable device market is here to stay. Continue Reading
-
What are some use cases for app refactoring?
App refactoring can be handy for businesses that need to add mobility to legacy systems but don't have the time, money or expertise to build a native app from scratch. Continue Reading
-
Are there any open source mobile device management tools?
Whether you need a basic open source mobile device management tool for your company's Apple or Android devices, or something more customized, you have options -- and they're free. Continue Reading
-
What are the use cases for virtual mobile infrastructure?
Virtual mobile infrastructure technology is primarily a security play, but it also can bring benefits for regulatory compliance and mobile app deployment. Continue Reading
-
How secure is cellular data transmission?
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network. Continue Reading
-
Is the Microsoft HoloLens 3D headset the next great enterprise mobility tool?
There's no shortage of enterprise use cases for Microsoft's HoloLens 3D headset, but its size and cost could prevent true, consumer-driven mobility. Continue Reading
-
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking. Continue Reading
-
How can IT benefit from the new iOS remote management UI?
Poor communication between IT and users can hinder MDM enrollment. Apple is trying to ease employees' apprehension with its remote management UI feature. Continue Reading
-
What's the best way to acquire third-party applications?
Only some organizations have the means to develop in-house mobile applications, so IT often has to make the most of the third-party options available. Continue Reading
-
What are the key ingredients of a corporate mobility policy?
There’s more to going mobile than just deploying and supporting devices. Enterprises should understand the fundamentals of mobile device policy. Continue Reading
-
How does Box security help with auditing and compliance?
Box's security features help IT admins audit data access and limit the sharing of sensitive information stored in the cloud. Continue Reading
-
Android malicious apps: How to tell secure Android apps from malware
Distinguishing malicious Android apps from clean ones can be tough, particularly for users with little security savvy. Expert Nick Lewis gives advice. Continue Reading
-
Do any particular mobile device vulnerabilities outweigh the others?
Are there certain mobile devices that are inherently more vulnerable than others? Learn more in this expert response from Nick Lewis. Continue Reading
-
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading
-
Is there a way to identify active users on a wireless network?
-
Troubleshooting Bluetooth Windows XP connection
I have set up Windows XP Internet Connection sharing over Bluetooth, but the connection will resolutely not be shared. Can you help? Continue Reading
-
What are "closed networks" in a cellular wireless network and why are they needed?
-
PDA technology for sales and marketing
Where do you see PDA technology going and aiding the business world? What are some of the new type of applications that will make a difference for sales and marketing type of users? Continue Reading
-
RFID tagging for employee tracking
Is there any software and hardware available (like RFID) to interface remote event-type (on/off) hardware to track employees? Continue Reading
-
Solving wireless signal interference from brick walls
Does having brick walls between my wireless router and PCI receiver pose any problems with the signal? Continue Reading
-
Can you tell me about "thin" versus "fat" WLAN?
The terms "thin" and "fat" WLAN have been applied many ways. Continue Reading
-
Why don't CDMA systems have SIM cards in the handset?
-
What is VSAT technology?
-
What is EAPOL and how do I disable it?
What is EAPOL and how do I disable it? Continue Reading
-
What's the difference between 802.1i and 802.11i?
-
What limits wireless bandwidth?
-
Open source authenticator implementation for LANs
-
Is there a relationship between data rate and throughput in a wireless network?
Is there is any relation between the basic data rate and the throughput that can be achieved in a wireless network? Continue Reading
-
What are the current applications for infrared wireless?
-
The difference between embedded systems and wireless embedded systems
-
Retrieving information using a remote PC, via GSM/GPRS
-
Setting up a LAN using VSAT technology
-
The difference between ZigBee and IEEE 802.15.4
-
Infrastructure mode and ad hoc mode at the same time?
-
Maximum transmission rates for VSAT systems
-
What is the difference between the ISM band and the UNII band?