- August 13, 2019
The capabilities that come with connecting your smartphone to your PC can have substantial benefits for end users, according to analysts, as Samsung and Microsoft partner.
- June 28, 2019
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems.
- May 14, 2019
Dell's Latitude PCs get a new look and new features that could make it easier for IT admins to support a mobile workforce, according to analysts.
- February 04, 2019
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
- July 24, 2017
As more vendors bundle enterprise mobility management into suites, it's important for organizations to be aware of the different ways to buy the technology.
- April 24, 2017
More developers have bought into AppConfig's common mobile application management features so they can target a larger share of the EMM market. But not all vendors are on board.
- April 05, 2017
MAM provider Apperian looks to take advantage of a larger support staff and new mobile application security technology following its acquisition by Arxan.
- March 22, 2017
IBM MaaS360 can now take advantage of Watson machine learning. Its new Advisor tool recommends policies based on analyzed user data for IT to implement on PCs and mobile devices.
- March 21, 2017
Knox's E-FOTA feature lets IT test Android OS updates before users install them on their Samsung devices, preventing apps from breaking.
- March 07, 2017
Organizations that use Sophos desktop management are intrigued by new EMM features the company continues to add. Some may move their mobile devices to Sophos for a UEM approach.
- January 10, 2017
The Modern Mobility Innovation Awards recognize four creative and successful enterprise mobile projects. These initiatives took advantage of everything from managed services to advanced app development techniques to mobile backend as a service. ...
- December 27, 2016
IT shops need to stay on top of the latest mobile advancements, but which are the most crucial to the enterprise? Three mobile trends could dictate the future of mobility.
- December 20, 2016
Businesses prefer implementing a BYOD model because of user demand, the rising cost of data plans and overage fees, and legal reasons. It may not save IT money, however.
- November 17, 2016
Citrix will roll out a few ShareFile updates on its web app that allow users to request approvals and e-signatures on digital documents.
- November 11, 2016
As 2016 comes to a close, it’s a good time to reflect on what we’ve learned over the past year. What are the major trends that have dominated the end-user computing industry? Who are the biggest ...
- September 08, 2016
IBM and Box expand their partnership to build Box Relay, an add-on service to Box that puts the power to automate workflows directly into user's hands.
- July 15, 2016
You can't hang a "Do not disturb" sign on a mobile device. But users want their privacy when it comes to working on smartphones and tablets. IT must figure out how to balance their personal privacy with the ability to secure corporate apps and data ...
- July 15, 2016
Keep it secret, keep it safe -- that's what mobile users want for their personal data, even if it's on a work device. Enter the need for mobile device privacy policies in the workplace.
- May 26, 2016
There are more EMM tools to choose from than ever, but many companies are still in the early stages of deciding how to manage mobile users. IT pros at Citrix Synergy 2016 explain.
- May 11, 2016
Okta and Box expand their partnership to include mobile identity management and single sign-on capabilities. EMM vendors, such as MobileIron and VMware AirWatch, also get in on the game.
- May 10, 2016
More mobile certifications are coming out of the woodwork, giving IT pros a chance to develop their skills in everything from EMM products to mobile strategy.
- May 10, 2016
A mobile center of excellence makes mobility top line and puts all stakeholders within an organization on the same page.
- April 15, 2016
Mobile backend as a service provider Kinvey's new HIPAA-compliant offering, which runs on the Google Cloud Platform, tackles the problems of free-flowing mobile data.
- April 12, 2016
Organizations need the right infrastructure to support mobility. The IT admins in charge of those systems isn't always ready (or willing) to help.
- April 04, 2016
More mobile administrators are seeking IT certifications to show off their expertise. Security is a critical part of learning the ins and outs of enterprise mobility.
- January 13, 2016
A lot of organizations don't understand what it takes to maintain compliance on mobile. It starts with keeping track of devices and apps.
- November 11, 2015
Enterprise mobility is no longer about just supporting employees' personal devices. Organizations are taking steps beyond adopting the BYOD model to embrace content and data management.
- November 11, 2015
The BYOD trend isn't as relevant as it once was. Enterprise mobility today is about much more than employees bringing their own smartphones and tablets to work. Organizations instead need to focus on mobile apps, management and security as a whole, ...
- October 02, 2015
Cisco's John Chambers and Box believe IT digitization will impact every business whether they're ready or not.
- September 30, 2015
Apple and Box have their sights set on businesses, with the expectation that enterprises have only just begun to take advantage of mobile features.
- September 01, 2015
VMware didn't move its EUC portfolio many steps forward during VMworld this year, and no word on its IoT plans, leaving some IT pros disappointed.
- September 01, 2015
Cisco plans to prioritize iOS business content on its enterprise mobile networks as part of the company's partnership with Apple.
- August 27, 2015
Mobile devices have become just as important, if not more, than PCs, as millennials expect to do their work anywhere -- on devices supplied by employers.
- August 14, 2015
There are a number of paths to enterprise mobility, and in many cases, EMM takes a backseat to apps.
- June 30, 2015
Mobile security has come a long way, but organizations still have to address many sizable gaps.
- June 05, 2015
Security fears dominate much of the discussion around enterprise mobility. How can businesses secure devices they don't own? How can they protect data created outside the firewall? This month’s cover story talks about new technologies born out of ...
- June 05, 2015
Wearable devices might be the next big trend, but they still have limited functionality in the enterprise. As new use cases emerge, WYOD will gain more traction.
- April 17, 2015
The latest VMware/AirWatch integration with NSX creates individualized virtual networks for enhanced security.
- February 27, 2015
In this Q&A, wireless and mobile advisor Craig Mathias of Farpoint Group discusses why he thinks BYOD is the superior mobility model to COPE.
- February 06, 2015
A lot of enterprises struggle with the financial side of the bring your own device model, so it's important to develop a smart system for compensating employees.
- December 17, 2014
IT hopes to lure end users out from the shadows through proactive and reasonable compromise. Some say it may be working.
- August 01, 2014
Mobile security threats come from unlikely places. In this three-question Q&A, MobileIron's security expert offers simple ways IT admin can provide end users the freedom to work securely from their mobile devices anywhere they choose.
- December 13, 2013
Which tablet should you buy? Our 2013 tablet comparison guide helps you make an informed decision based on what you need.
- November 08, 2013
The bring-your-own-device trend can put companies in hot water regarding employee privacy, but strong policy and the right tech can mitigate the risk.
- September 03, 2013
Microsoft's $7.2 billion Nokia acquisition gives Microsoft smartphone device access but industry skeptics wonder about the long-term strategy.
- August 15, 2013
The maturing tablet market cooled off in Q2 but new Intel based tablets due in Q4 could give companies a new reason to buy.
- August 12, 2013
Enterprises are limited in implementing mobile strategies due to security issues, network connectivity and compatibility.
- July 10, 2013
Mobile computing bloggers share their tips for embracing a mobile-first approach and measuring the ROI of smartphones and tablets in the enterprise.
- June 14, 2013
Knowledge of the National Security Agency's surveillance has led some companies to revamp their data privacy policies.
- May 10, 2013
Thinking about a BYOD program? Make sure you know what the business value is, and that you're not just doing it to placate gadget-happy end users.
- October 10, 2012
BYOD programs can bring many benefits, but even veteran BYOD shops such as Citrix run into occasional problems.
- August 17, 2011
Shocker: Resellers cite some big orders for non-Apple tablets.
- April 18, 2011
There are lots of tools available for mobile endpoint security and management, but few offer the total solution. That leaves VARs with lots of work to do.
- February 21, 2011
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.
- June 16, 2010
To the chagrin of IT pros, end users want to bring their own devices to work. Virtual desktop technology can help those companies willing to support non-standard computers.
- September 22, 2009
The tidal wave of threats against your company's IT resources -- and in particular, its data -- has never been higher. As users store company data to their smartphones and similar mobile devices, we asked Sean Glynn, head of product development with...
- October 22, 2008
Enterprise IT organizations are underestimating the number of mobile workers they have. Beyond the knowledge workers and executives who have corporate smartphones, a new class of employees want to use their personal mobile devices on the job. IT ...
- October 08, 2008
With terrible indoor cellular coverage impeding its ability to support mobile users, the hospital chain Baptist Healthcare System adopted a distributed antenna system from ADC. The system improved patient care at its hospitals and its ability to ...
- August 13, 2008
The durability of ruggedized mobile devices is only the first consideration for mobile managers with workers who take devices into hazardous environments. Connectivity, usability and portability are also important features.
- August 29, 2007
Mobile security is not top-of-mind for many mobile workers, according to recent research by Cisco and the National Cyber Security Alliance.
- March 21, 2007
Mobile device menus can help IT get a handle on the number of devices brought into the enterprise. But enforcing that device menu can be tricky.
- September 19, 2006
After a few days of swirling rumors, Motorola today acquired Symbol Technologies, a move that will help users gain more flexibility in mobile device choice and support.
- January 18, 2006
Stop & Shop supermarket customers enjoy free Wi-Fi -- an investment that results in so-called soft benefits.
- January 11, 2006
BGAN, Broadband Global Area Network, is ready to hit the U.S. this year. The satellite service will beam DSL speed connectivity to roughly 85% of the earth's landmass and 98% of its population.
- June 30, 2005
The Java Community Process is working on specifications that should make it easier to manage Java-based devices in the enterprise.
- May 20, 2004
An IDC analyst said it's important to invest in planning well in advance of a mobile deployment, but one attendee said that convincing executives to spend the money is a challenge.
- May 20, 2002
Wireless insecurity: It's all in the device
- November 08, 2001
This useful article discusses wireless technologies and outlines some of the problems that have been identified to date. Wireless areas covered: mobile commerce, encryption over wireless platforms, mobile devices, WAP, WEP, WTLS, SSL, wireless LANs,...