Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Protecting the corporate network with a mobile device security strategy
With a security strategy that includes device discovery and impact assessment, you can protect your corporate network from some mobile device dangers. Continue Reading
Advanced mobile device management software capabilities to consider
Once you have the basics of MDM down, it's time to look into more advanced mobile device management software for service, app and document management. Continue Reading
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies. Continue Reading
-
Citrix XenMobile combines MDM, MAM, file-sharing for mobile management
Citrix users say the company's unified enterprise mobility management product, XenMobile, may make it easier to deliver business applications to on-the-go users. Continue Reading
mobile information management (MIM)
Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. Continue Reading
Best practices for improving mobile data security
MDM and MAM software give IT control over mobile data security risks. Requiring passwords, encrypting stored data and using remote wipe can help too.Continue Reading
Q&A: Citrix discusses enterprise mobility management challenges, goals
Citrix discusses the company's mobile enablement strategy and how anyone with an app and Amazon Web Services can disrupt legacy technology vendors.Continue Reading
BYOD policies help IT get a grip on consumerization
Mobile device management checklist
A well-thought-out mobile device management strategy is a key ingredient for any successful mobility deployment.Continue Reading
Minimizing BYOD security risks through policy and technology
You can mitigate the major BYOD security risks by implementing policies, employing the right technologies to enforce them and encrypting data.Continue Reading
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.Continue Reading
Mobile application developers debate hybrid solutions
Mobile applications developers stuck on the HTML5-native debate have a third option -- building hybrid apps.Continue Reading
Remote wipe 101: Policy and how-tos for protecting mobile data
Most mobile devices have native remote wipe capabilities. If those features aren't enough for your company, supplement them with MDM and the cloud.Continue Reading
Policy and security quiz for shops with BYOD support
Think you know all about BYOD support? Prove it! Take our quiz on BYOD policies, security and data protection.Continue Reading
dual persona (mobile device management)
Dual persona, in a mobile management context, is the provisioning and maintenance of two separate and independent end user environments on a single mobile device. Dual persona technology addresses one of the challenges of the bring your own device ...Continue Reading
Mobile configuration management functions for successful MDM
Configuration management functions are some of the most important features of an MDM system. Make sure yours can secure files, email and passwords.Continue Reading
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications.Continue Reading
Enterprise mobility management options: MDM, MAM and MIM
Forget the debate over managing devices, applications or information. The key to successful enterprise mobility management is combining the three.Continue Reading
BYOD security policy considerations and best practices
You've decided to allow BYOD, but you're concerned with data and device security. What should you do next? Write up a BYOD security policy, of course.Continue Reading
Sandboxed email clients secure mobile devices, manage mobile email
Sandboxed email clients provide secure method for managing corporate mobile email. But, this approach diminishes the value of mobile devices.Continue Reading
Active Directory deficient for consumerization-era identity management
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough.Continue Reading
VMware Horizon Application Manager
VMware Horizon Application Manager, also known as Horizon App Manager, is an enterprise service for managing access to software. With VMware Horizon Application Manager, employees can use any Internet-capable device to access applications through a ...Continue Reading
Android versus iOS security: Features, policies and controls
There’s not a clear winner when it comes to Android versus iOS security, but with iOS’ app security in one corner and Android’s encryption in the other, it makes for a good fight.Continue Reading
Exchange ActiveSync mobile management FAQ
As more users bring their smartphones to work, admins turn to ActiveSync for basic management. Unfortunately, not all ActiveSync mobile management features work on all devices.Continue Reading
Jailbroken device risks: What IT can (and can't) lock down
A jailbroken device gives its user more freedom and flexibility, but it could also harm the network or put data at risk. Unfortunately, IT can't do much to prevent jailbreaking.Continue Reading
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT.Continue Reading
BYOD policy basics: Defining and enforcing a successful policy
A BYOD policy is critical for any organization that allows consumer devices on the network. Defining and enforcing policies can prevent problems that come in the BYOD era.Continue Reading
How to create a BYOD policy
Without a comprehensive BYOD policy, IT’s just asking for management and security nightmares. Clearly spell out what users can and can’t do, and you’ll keep the boogey man at bay.Continue Reading
unified network management
Unified network management is the administration of both wired and wireless networks through a single interface.Continue Reading
BYOD policy
A BYOD policy, or bring-your-own-device policy, is a set of rules governing a corporate IT department’s level of support for employee-owned PCs, smartphones and tablets.Continue Reading
corporate mobility policy
A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network.Continue Reading
end user policy
An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assetsContinue Reading
mobile device management software
Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.Continue Reading
consumerization policy
A consumerization policy is a documented set of practices for managing the use of consumer devices and technologies within a given organization. A consumerization policy defines acceptable use.Continue Reading
Network access control policy: Handling smartphone access control
NAC can be helpful for laptops and desktops, but it’s limited with mobile devices. In this tip, learn how to extend NAC for smartphone access control.Continue Reading
Enterprise device management: A brave new world
Windows desktops aren't the only game in town. Smartphones and tablets are changing the face of IT client management, whether you like it or not.Continue Reading
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis.Continue Reading
Quiz: Managing mobile devices in a health care setting
As smartphones and tablet PCs make their way into health care organizations, IT departments face many challenges. Take this quiz to see what you know about managing mobile devices.Continue Reading
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.Continue Reading
Tablet security: Best practices for the tablet computer onslaught
Tablets are taking the enterprise by storm, and tablet security is a major concern. Find out which mobile device security best practices you're already using can apply to tablets, and which you will need to revisit to keep tablets secure.Continue Reading
Managing mobile devices smarter, not harder
Smartphones are all over the enterprise -- can you manage them? We've compiled tips, reviews and more to help you update your organization's mobile device management strategy.Continue Reading
Configure CA certificates for iPhone and Exchange Server 2007
Since the iPhone was not originally intended for enterprise use, certain operating system components -- like the certificate store -- are hard to locate and configure. But by following a few steps and properly configuring your certificates, the ...Continue Reading
Identify Exchange Server 2010 ActiveSync certificate errors
There are numerous issues that can prevent ActiveSync from working properly on Exchange Server 2010 mobile devices. But certificate-related issues are usually the most common causes. Get troubleshooting basics to ensure your certificates are ...Continue Reading
Exchange Server 2010 features pinpoint mobile device issues
If you've recently deployed Exchange Server 2010 in your organization and a user calls with a mobile device problem, look at the Exchange Control Panel first to start diagnosing the problem.Continue Reading
Managing mobile authentication methods
Find tips for managing mobile authentication methods and learn how to control what mobile laptops, PDAs and smartphones can and cannot do inside your network.Continue Reading
Managing mobile device diversity
In a perfect world, your entire workforce would carry one or two well-chosen mobile devices that could be managed easily and effectively through a single platform. Unfortunately, few IT managers enjoy this luxury – most must deal with an ...Continue Reading
Mobile Device Manager joins Windows domains to mobile devices
Microsoft's Mobile Device Manager gives IT managers better tools and added network support to improve management of devices that run Windows Mobile 6.1.Continue Reading
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy.Continue Reading