Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Four ways mobile app management helps IT admins and end users
MAM offers IT granular control over mobile data, keeps work and personal information separate and manages the mobile app lifecycle. Continue Reading
Four mobile UX design mistakes to avoid
The user experience can make or break an app, so strong mobile UX design is of utmost importance in today's enterprise development teams. Continue Reading
Three mobile security threats IT should know
When it comes to mobile security threats, IT has more to deal with than just risky, malicious apps. Continue Reading
-
Cloud services increase risk of mobile data loss
Many users access cloud services from their mobile devices, only increasing the risk that corporate data leaks through services such as Dropbox or Google Drive. Continue Reading
Apple in the enterprise: A force to be reckoned with
Businesses forced to confront the flood of users' Apple devices struggle with management and security, despite the benefits iPhones and iPads bring to employees. Continue Reading
The good and bad of supporting Apple devices
As more consumers bring Apple products into the workplace, IT needs to manage and support users' smartphones and tablets, along with the iOS operating system. To further complicate matters, Apple constantly changes and upgrades its products, and ...Continue Reading
Three ways AirWatch secures mobile Office365 applications
With AirWatch by VMware, IT can manage Office365 applications on users’ mobile devices – all the while making sure those apps are secure.Continue Reading
Challenges of developing applications for mobile platforms
This podcast explores developing applications and the challenges for independent app developers across various mobile platforms.Continue Reading
MADPs simplify app development but limit customization
MADPs offer reusable code and cross-platform capabilities to make app building easy, but there are some downsides like vendor lock-in and limitations because of OS standards.Continue Reading
What it means to have a mobile-first strategy
A lot of organizations think they support mobility just because they enable users to bring in as many devices and apps as they can, but that overlooks the top priority: understanding and addressing employee needs.Continue Reading
-
Test your iOS management and security expertise
Apple has introduced more and more iOS management and security features for IT over the past couple years. How well do you understand the tools at your disposal?Continue Reading
Marry MDM and Managed Open In for better iOS data security
Mobile device management just isn't enough anymore for some enterprises. Apple's open-in management feature can provide an extra layer of app security on iOS devices.Continue Reading
New Pulse Secure CEO on what mobile security lacks
Mobile security has come a long way, but organizations still have to address many sizable gaps.Continue Reading
Oracle, Red Hat jump on the mobile bandwagon with MBaaS
Oracle and Red Hat have both introduced mobile backend services to gain new customers for their other cloud services.Continue Reading
IT sees little demand for complex mobile apps
These days, plenty of desktop apps have a mobile equivalent or can be converted. But mobilizing business-critical apps may be futile.Continue Reading
Apple, EMMs team up to deploy mobile apps for business
VMware's AirWatch and MobileIron will work with iOS to deploy secured business apps in a different way than Apple's IBM partnership.Continue Reading
Mobility breeds software license management complexity
Vendors want IT to think software licensing in the mobile era is flexible, easy and simple, but that's not always the case.Continue Reading
Why app wrapping is here to stay
Some people predicted a short shelf life for app wrapping, but it's become a valuable mobile application management option for companies that want to skip out on extra app development.Continue Reading
WYOD arrives as wearables market matures
Wearable devices might be the next big trend, but they still have limited functionality in the enterprise. As new use cases emerge, WYOD will gain more traction.Continue Reading
Mobile and cloud technologies go hand in hand
Providing data access through cloud technologies is a critical part of what makes enterprise mobility flexible and scalable.Continue Reading
Mobility brings new ways to tackle IT security threats
Enterprise mobility has brought major changes to the way IT approaches security, especially when it comes to controlling network access.Continue Reading
MAM ensures mobile data security in ways MDM can't
IT can add several important controls through mobile application management, such as app wrapping, containerization, lifecycle management and enterprise app stores.Continue Reading
Keolis says bon voyage email, hello content collaboration
When email wasn't getting the job done anymore, Keolis turned to collaboration software and cashed in on the results.Continue Reading
Progress Software acquires development tools
Progress Software acquisitions return company to its legacy by supporting developers and development tools.Continue Reading
Top 10 Citrix ShareFile features
Attendees at Citrix Synergy 2015 learned about the top ShareFile features IT can’t live without, including XenMobile and Office 365 integration and optimization for virtual desktops.Continue Reading
Four crucial enterprise mobility mistakes to avoid
Mobile initiatives are complex, but IT can keep its project on track by using analytics and recognizing the differences between mobile and desktop app development.Continue Reading
Mobile device policy guide: How BYOD policies help IT manage devices
As companies embrace mobile devices, they should also introduce guidelines for their use. Learn about bring your own device and other policy types.Continue Reading
Is it time to merge desktop and mobile app management?
Considering all the advancements in desktop and mobility management over the past few years, the moment is finally here to ponder unifying IT's approach to management.Continue Reading
Why you need mobile infrastructure
IT shops need to invest in modern mobile infrastructure to meet the growing demands of mobility in the enterprise.Continue Reading
Enterprise app stores give IT control over access, monitoring
Companies that deploy enterprise app stores are discovering the advantages of avoiding public stores, including added control, security and monitoring capabilities.Continue Reading
There's an enterprise app store for that
Applications are the new stars of the enterprise computing show. Users love apps, but there are so many of them, and they can run on such a variety of different platforms, it's enough to make heads spin throughout IT departments and C-suites. This ...Continue Reading
Android device management: Everything you need to know in one guide
The Google Android mobile operating system runs on a wide variety of devices. Learn how IT can manage and secure such a diverse OS in the enterprise.Continue Reading
How can IT benefit from the new iOS remote management UI?
Poor communication between IT and users can hinder MDM enrollment. Apple is trying to ease employees' apprehension with its remote management UI feature.Continue Reading
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys.Continue Reading
How to manage the scope of your mobility initiative
Even the most well-conceived mobility initiatives can turn into projects too big to pull off. Don't let the thought of what else is possible distract from your original goal.Continue Reading
Beware of the BDaaS double boomerang
As big data increases, the ability to access and control that data becomes a power struggle for IT. Learn why BDaaS impacts inner company relations.Continue Reading
Comparing iOS 8 vs. Android 5.0 for enterprise use
The standardization provided in iOS makes it easier to manage than Android, but Google is quickly catching up with new features such as Android for Work.Continue Reading
Meeting the demands of mobility with DevOps best practices
More companies are turning to DevOps to help develop, provision and manage mobile applications, but a solid DevOps strategy can be challenging.Continue Reading
The changing role of DevOps in enterprise mobility
The lines between mobile application development, enterprise mobility management and mobile infrastructure get blurrier by the day. It's hard to find the right tools to properly manage and secure apps after they've been built, and even harder to ...Continue Reading
Maximize your business' mobile budget by understanding TCO
IT's focus is on productivity and security, but shrewd enterprises also pay attention to ROI for their capital and operational expenses around mobility.Continue Reading
Mobile app development tools to improve user experience
A new series from HP was created to help app developers get an edge on user experiences, dissatisfaction and habits.Continue Reading
Five mobile data loss prevention tools IT needs
Protecting corporate data is a big job, but IT has a wide variety of tools at its disposal when it comes to data loss prevention.Continue Reading
Mobile content management software, EFSS protect data in the cloud era
Thanks to mobile and cloud computing, the number of potential repositories for corporate data have increased exponentially. Traditional file storage systems, content management software and device-centric security measures can only do so much to ...Continue Reading
Mobilizing enterprise apps depends on management strategy
Applications are the engine that makes mobility run. This chapter covers the different approaches to bringing enterprise software functionality to smartphones and tablets. Options include in-house development, third-party apps, virtualization and ...Continue Reading
Set employee mobility and business goals before committing to EMM
Any mobility initiative needs some level of enterprise management, but it's important to set objectives for business outcomes and assess user needs first.Continue Reading
Prepare for WYOD management and security challenges
Enterprise wearables will soon usher in the age of wear your own device, but IT needs to ready itself for the management and security challenges of WYOD.Continue Reading
Teaching developers UX analysis boosts mobile app performance
Employees can be fickle over which mobile applications they use. That's why it's smart to monitor user experience and tweak apps to better meet user expectations.Continue Reading
Crafting a bring your own device security policy
Bring your own device initiatives are now commonplace in the enterprise, but any BYOD policy is incomplete without addressing acceptable use, enforcement and privacy.Continue Reading
Enterprise social collaboration tools change how we work
Workers understand and take advantage of collaboration tools in their personal life. It's time for IT to play catch-up and implement effective social platforms in the enterprise.Continue Reading
Move to workforce mobility demands vigilance
Enterprises that go mobile can benefit from increased productivity, but only if they craft policies and use products that monitor access and secure data.Continue Reading
How much corporate data access should BYOD users have?
Mobile access to company data is one of the surest ways to boost productivity, but IT often has to weigh those benefits against the security risks of bring your own device (BYOD).Continue Reading
How to improve productivity through mobile UX design
IT has to deliver a high-quality user experience and provide a mobile-friendly workflow to get workers to buy into a mobile initiative. It all starts during app development.Continue Reading
Three ways to get user buy-in for enterprise mobile apps
Developing your own enterprise mobile apps can be a good idea, but remember that their success hinges on user buy-in. There are several ways to improve your chances of winning over the workforce.Continue Reading
Mobile user experience design key to app success
Employees nowadays want their business apps to work as smoothly as Facebook. It's making IT focus in on mobile user experience design.Continue Reading
Mobile application lifecycle management dictates user experience
Business users want enterprise apps to update as fast as consumer apps. The pressure is on IT to improve mobile application lifecycle management.Continue Reading
Mobile app support should outweigh device preferences
Don't let consumer popularity cloud your decision-making process when it comes to enterprise device options. Mobile app support is a far more important consideration.Continue Reading
Design a blueprint for building a mobile workforce
Mobility is such a radical departure from traditional enterprise computing that business and IT leaders sometimes don’t even know where to start. This e-book takes readers through the process of enabling and managing a secure mobile workforce. End ...Continue Reading
Building a mobile business
Mobile devices can improve productivity, but IT and vendors are catching up with enterprise mobility management strategies and products that must balance access with securityContinue Reading
Location-based mobile management raises employee privacy concerns
Tracking users' smartphones and tablets helps secure the devices and their data, but it also opens up a Pandora's box when it comes to privacy.Continue Reading
Open-in management helps secure iOS data
Apple's open-in management compartmentalizes apps and lets IT admins restrict sharing of corporate data. It's basic MAM built into iOS.Continue Reading
Mobile app development strategy quiz
A mobile app development strategy is a key first step on the road to a successful mobile app launch for your business. Test your knowledge to see if you're ready.Continue Reading
The IT pro's guide to mobile app delivery
Mobile app delivery can be a boon to IT pros wrangling with consumerization, but there's no guarantee any method will be easy or cheap.Continue Reading
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands.Continue Reading
Mobile data backup FAQ
The increasing number of mobile devices in enterprise environments means a mobile data backup plan is required, and it won't be the same as one for a laptop.Continue Reading
Apple iOS 8, iPhone 6 improve IT security and control
The expansion of passcode protection, Touch ID and device management features make Apple's latest devices and OS worth the enterprise upgrade.Continue Reading
Protect your network and data from internal threats
As the Edward Snowden case shows, there's no such thing as absolute security. That doesn't mean you shouldn't try to secure your network as much as possible.Continue Reading
CDMA vs. GSM: Do consumers still care?
As cellular technology develops, the carrier fights over standards like CDMA vs. GSM are starting to matter less and less. With LTE becoming the new standard, just how important are these differences to consumers?Continue Reading
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform.Continue Reading
Top techniques for mobile data loss prevention
To protect data on mobile devices, you need data loss prevention methods like dual persona technology to keep corporate information secure.Continue Reading
Mobile content management 101: Why you need MCM tools
As enterprise mobility management becomes more complex, IT shops need a more efficient way to control security. MCM tools can help.Continue Reading
Guide to iOS 7, OS X Mavericks and new Apple devices
Apple devices and OSes are consumer favorites, but they also come with management tools and application features that IT can take advantage of.Continue Reading
How to install CyanogenMod for rooting Android devices
There are many methods for rooting Android devices, including open source firmware such as CyanogenMod.Continue Reading
mobile content management
Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices.Continue Reading
Keeping track of mobile users? Device tracking laws are still in flux
Location services can be valuable to users, but it's not always acceptable -- or legal -- for employers to track users' devices and whereabouts.Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
Mobile content management market heats up as IT pros try new methods
There's no one-size-fits-all fix to mobile content management issues, but EMM vendors are upping the ante, and new, low-cost approaches are available.Continue Reading
Samsung Knox EMM to manage Android and iOS
Samsung has improved Knox's mobile security features, but businesses aren't sure about using the device manufacturer's new EMM tools.Continue Reading
How employees get around IT policies and restrictions
The policies that IT departments put in place are there to protect corporate data, but workers often go around those blocks to get work done.Continue Reading
Can Samsung Knox security make devices safe enough for Fort Knox?
Knox security tools help keep data safe and make Samsung devices viable even in high-security settings, but admins should enable all the features.Continue Reading
VMware EUC strategy on track, but desktop legacy could derail it
With new leaders in place and AirWatch in the fold, VMware's EUC group is poised to succeed -- if it can move beyond its desktop virtualization roots.Continue Reading
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases.Continue Reading
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features.Continue Reading
How to configure iPad for business use
Apple iPad Configuration Profiles and business apps turn the popular tablet into an enterprise workhorse without compromising data security.Continue Reading
VMware leaps into enterprise mobility management with AirWatch buy
Consolidation of the EMM world continues with the biggest move yet: VMware will purchase AirWatch for $1.54 billion to shore up its EUC division.Continue Reading
An admin's guide to mobile application security and delivery
Apps play a big role in employee workflows, so IT has to keep up with the different delivery methods and ways to improve mobile application security.Continue Reading
Cheat sheet: A fast guide to cloud collaboration
The details on cloud collaboration can be daunting -- consumer vs. enterprise, public vs. on-prem and more. Start with the basics in this cheat sheet.Continue Reading
Configuring Android smartphones and tablets for business use
With the right business mobile apps, Android smartphones and tablets can go from consumer toys to corporate tools.Continue Reading
Eight great mobile apps for business travelers
There's no shortage of apps for business tasks and travel, and it can be hard to sort through them all. Here are some worth checking out.Continue Reading
BlackBerry enterprise management in focus with CEO letter, BES 10.2
On the heels of an impassioned letter from its new CEO, BlackBerry tells everyone who'll listen that it's still the go-to for EMM with a BES 10 update.Continue Reading
Enterprise mobile security smackdown: iOS vs. Android vs. Windows
Enterprise mobile security is a top concern in IT today. Check out which mobile OS is best in the iOS vs. Android vs. Windows fight.Continue Reading
Put it on paper: A guide to mobile device policy creation
Do you have a mobile device policy? If not, you could be missing out on some easy ways to protect data and devices.Continue Reading
Top five mobile security concerns with consumerization
The rise of consumerization has introduced mobile security concerns for IT and users alike, including data loss and personal privacy troubles.Continue Reading
With Apple Bonjour gateways, say hello to cross-network discovery
New gateways let Apple Bonjour connect iOS devices to network resources across subnets, which makes Bonjour viable for enterprise use.Continue Reading
Tips and tricks for ensuring mobile data security
Whether workers use personal devices or corporate-issued ones, it's important for users and IT to work together and prioritize mobile data security.Continue Reading
The ultimate guide to cloud-based file sharing
Employees use cloud-based file-sharing services because they make work easier. The cloud can lighten IT's workload, too, if you lay a strong foundation.Continue Reading
Does a corporate app store make sense for your organization?
In the first of a three-part series, contributor Tom Nolle explains how to determine whether a corporate app store makes sense for your organization.Continue Reading
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also have some overlap. Knowing their differences is important.Continue Reading
Apple iOS device management cheat sheet
Managing iPhones, iPads and their apps can get tricky. Sometimes it's good to take a step back and look at the basics of iOS device management.Continue Reading
Apple enterprise features for managing iOS devices
IT can use Apple enterprise features to deploy profiles and MDM settings, improve mobile printing and help iOS devices and apps connect.Continue Reading
Ten BYOD management best practices
Learn about the status of tools for managing bring your own device and the top 10 BYOD management best practices.Continue Reading