Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Why you need mobile infrastructure
IT shops need to invest in modern mobile infrastructure to meet the growing demands of mobility in the enterprise. Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise. Continue Reading
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Mobile app development strategy quiz
A mobile app development strategy is a key first step on the road to a successful mobile app launch for your business. Test your knowledge to see if you're ready. Continue Reading
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
mobile content management
Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices.Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases.Continue Reading
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features.Continue Reading
-
BlackBerry enterprise management in focus with CEO letter, BES 10.2
On the heels of an impassioned letter from its new CEO, BlackBerry tells everyone who'll listen that it's still the go-to for EMM with a BES 10 update.Continue Reading
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies.Continue Reading
Citrix XenMobile combines MDM, MAM, file-sharing for mobile management
Citrix users say the company's unified enterprise mobility management product, XenMobile, may make it easier to deliver business applications to on-the-go users.Continue Reading
mobile information management (MIM)
Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.Continue Reading
Q&A: Citrix discusses enterprise mobility management challenges, goals
Citrix discusses the company's mobile enablement strategy and how anyone with an app and Amazon Web Services can disrupt legacy technology vendors.Continue Reading
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.Continue Reading
dual persona (mobile device management)
Dual persona, in a mobile management context, is the provisioning and maintenance of two separate and independent end user environments on a single mobile device. Dual persona technology addresses one of the challenges of the bring your own device ...Continue Reading
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications.Continue Reading
Active Directory deficient for consumerization-era identity management
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough.Continue Reading
Android versus iOS security: Features, policies and controls
There’s not a clear winner when it comes to Android versus iOS security, but with iOS’ app security in one corner and Android’s encryption in the other, it makes for a good fight.Continue Reading
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT.Continue Reading
unified network management
Unified network management is the administration of both wired and wireless networks through a single interface.Continue Reading
corporate mobility policy
A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network.Continue Reading
end user policy
An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assetsContinue Reading
mobile device management software
Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.Continue Reading
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets.Continue Reading
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis.Continue Reading
Quiz: Managing mobile devices in a health care setting
As smartphones and tablet PCs make their way into health care organizations, IT departments face many challenges. Take this quiz to see what you know about managing mobile devices.Continue Reading
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.Continue Reading
Managing mobile devices smarter, not harder
Smartphones are all over the enterprise -- can you manage them? We've compiled tips, reviews and more to help you update your organization's mobile device management strategy.Continue Reading
Mobile Device Manager joins Windows domains to mobile devices
Microsoft's Mobile Device Manager gives IT managers better tools and added network support to improve management of devices that run Windows Mobile 6.1.Continue Reading
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy.Continue Reading