Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
How can mobile app virtualization improve BYOD app access?
Mobile app virtualization isn't a new technology, but the latest generations of smartphones have made this technology more viable for everyday use for enterprise mobile users. Continue Reading
How can IT address smartphone battery drain and mobile UX?
Here are smartphone battery tips that admins should keep in mind. Find out all the factors that could affect the battery life and how IT can mitigate smartphone battery drain. Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
-
How can IT manage Android Things devices in the enterprise?
The Android Things program provides APIs that link atypical Android devices to Android smartphone management tools, so mobile admins must learn to manage Android Things devices. Continue Reading
How to install root CA certificates on iPhones and iPads
Apple iPads and iPhones can connect securely to enterprise networks, but IT admins need to install root certificates or CA certificates to the devices first. Continue Reading
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise.Continue Reading
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market.Continue Reading
How can Android Enterprise Recommended improve user privacy?
To tackle the issues of mobile user privacy and security at the same time, IT can deploy Android Enterprise Recommended devices and partition them with an Android Enterprise API.Continue Reading
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process.Continue Reading
How can zero-touch enrollment help Android admins?
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can benefit from this method.Continue Reading
-
Which Android Device Admin APIs will Google deprecate?
With the release of Android Q, Google will discontinue several Android Device Admin APIs. Learn which Android management APIs will be deprecated and which will remain.Continue Reading
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment.Continue Reading
Use Android Enterprise to lock down mobile devices
IT can integrate Android controls with EMM tools via APIs from Google's Android Enterprise program. These EMM capabilities can help IT manage updates and secure devices.Continue Reading
4 mobile security best practices for enterprise IT
Organizations should look to update their mobile security best practices due to COVID-19. IT must incorporate BYOD access to corporate data and other new mobile capabilities.Continue Reading
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios.Continue Reading
Why Linux on Samsung DeX creates challenges for IT
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management.Continue Reading
How can IT use the OAuth 2.0 protocol for iOS 12 devices?
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too.Continue Reading
What problems occur with Intune app protection for Outlook?
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction.Continue Reading
Prepare for the death of Intune's hybrid MDM
Microsoft is making some changes that could affect mobile device management with Intune. Here's how admins can stay prepared and reap the benefits of the stand-alone service.Continue Reading
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates.Continue Reading
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions.Continue Reading
Combat mobile device security threats at home and abroad
Employees that travel for business face a higher risk of a mobile security breach. Take these steps to ensure that your mobile device fleet is secure.Continue Reading
How to avoid wasting time in a mobile app development project
A tedious, drawn-out app development process can frustrate everyone involved. Follow these five tips and tricks to ensure that developers don't waste time.Continue Reading
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics.Continue Reading
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities.Continue Reading
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies.Continue Reading
How can IT create a diverse endpoint management strategy?
IT admins have to keep up with both the growing technology outside and the endpoint diversity inside the organization. But they can take some simple measures to manage devices.Continue Reading
Test your knowledge of mobile security issues
As the mobile enterprise grows, so do cyberthreats. See how well you know the top mobile security risks, and learn how to better protect employees and organizations from them.Continue Reading
Sapho mobile app development software helps simplify workflows
When corporate apps are slowing down workflows, it's time for an overhaul. One company used Sapho mobile app development software to build micro apps with simplified features.Continue Reading
TeamViewer helps solve remote customer support dilemma
Providing remote customer support can be a challenge for organizations of any size. But there's an app for that -- which one software provider put to good use.Continue Reading
Four tips for reducing mobile app development costs
Don't get stuck with hidden fees and unnecessary designs with mobile app development. Cut off the high sticker price by focusing on the user experience and going cross-platform.Continue Reading
How can IT tackle the top mobile security issues?
With so many mobile security challenges around the bend, admins may worry they'll never see the finish line. IT can achieve security success by staying ahead of the curve.Continue Reading
Law firm restricts mobile data access in the danger zone
When remote employees access mobile data, whether in the U.S. or abroad, it can be difficult to restrict that access. But when they travel to blacklisted nations, IT must be especially careful.Continue Reading
Wi-Fi troubleshooting checklist for mobile devices
With an ever-growing mobile workforce, Wi-Fi is an essential part of business today. But all mobile devices can hit Wi-Fi snags. Luckily, IT has plenty of ways to untangle the mess.Continue Reading
How to overcome common enterprise mobility challenges
Many companies lack the right policies or tools necessary to implement a successful enterprise mobility strategy. Find out what your mobile initiative might be missing.Continue Reading
Sears speeds up appliance repairs with GoToAssist Seeit mobile app
Sears Home Services needed to find a better way for its technicians to collaborate on complex repairs. GoToAssist Seeit has boosted worker productivity and customer service.Continue Reading
Pop quiz: Do you know the best mobile security techniques?
Do you know the significance of changing from a four-digit passcode to a six-digit one? Test all your IT knowledge on this mobile security quiz.Continue Reading
Have you updated your iOS apps to 64 bits?
Apple is dropping of support for apps that aren't 64-bit binaries. The number of ripe-for-banishment 32-bit apps in the Apple app store hovered around 170,000 as of mid-March 2017.Continue Reading
Five mistakes companies make when creating mobile strategies
Many companies face obstacles in trying to go mobile, but not every mobile initiative has to be treacherous. IT can take steps to avoid making common strategy mistakes.Continue Reading
GE enlists Couchbase to enable offline mobile apps across industries
General Electric's implementation of Couchbase is a winner in the Modern Mobility Innovation Awards. The project involved building an offline capability and more for GE's Predix platform.Continue Reading
Modern Mobility Innovation Awards: Four mobile projects triumph
The Modern Mobility Innovation Awards recognize four creative and successful enterprise mobile projects. These initiatives took advantage of everything from managed services to advanced app development techniques to mobile backend as a service. ...Continue Reading
Kony helps put the 'human' in Telstra's HR mobile app
Telstra's implementation of Kony wins a Modern Mobility Innovation Award because it relied on user feedback to build a productivity-boosting HR mobile app.Continue Reading
Mobile network security remains an enterprise challenge
Workers demand access to their company's network anytime, anywhere -- making mobile network security a constant challenge for IT. Admins can turn to SDN and NFV technology.Continue Reading
How well do you know enterprise mobile devices?
It can be a chore to pick the right mobile devices for business users. Put your knowledge to the test with this quiz on Samsung devices, iPhones and more.Continue Reading
Why the worst mobile security risks just won't go away
The biggest mobile security threats aren't hiding in the shadows. For IT admins who don't properly secure mobile devices and apps, the monster is in the mirror.Continue Reading
IT, not BYOD users, must control mobile device encryption
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks.Continue Reading
'Shrek' holds the key to your mobile security fairy tale
With Comcast's acquisition of DreamWorks Animation in April, "Shrek" fans could see the fairy tale-esque story revived with more movies in the coming years, according to Forbes. In the original ...Continue Reading
Show off your knowledge of Apple Watch for business users
The Apple Watch's release caused a stir, but does it fit in the office? This quiz tests you on the top Apple Watch business features that could bring the device into the workplace.Continue Reading
Do you know mobile application development tools? Prove it!
Mobile app development tools are crucial in today's application-centric business world. Put your knowledge to the test in this mobile app development quiz.Continue Reading
What Frodo Baggins can teach IT about iCloud security
As the hobbit Frodo Baggins leaves the familiar surroundings of his home in the Shire in the movie The Fellowship of the Ring, he remembers something his uncle Bilbo told him, "It's a dangerous ...Continue Reading
BYON brings its own security challenges
Bring your own device is a common practice, and now bring your own network is on the scene -- whether IT likes it or not.Continue Reading
Prove your knowledge of security for mobile devices
Do you know what it takes to provide mobile security? Take this quiz that covers differences in mobile OSes, containerization, data encryption and more.Continue Reading
Top 5 mobile security deal breakers
In the TV show 30 Rock, comedy writer Liz Lemon writes a sketch that spawns the catchphrase, "That's a deal breaker, ladies!" The phrase refers to anything a partner might do that could ...Continue Reading
Three ways to help users access mobile data
There's no shortage of enterprise file sync-and-sharing services available to provide access to mobile data, but they're not the only option, and they're not right for every organization.Continue Reading
Three ways to provide mobile data access
Mobile workers need access to corporate data, and every business must choose a method that meets its users' needs. Questions about security and offline capabilities are at the core of any discussion about providing mobile data access. Offline or not...Continue Reading
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security.Continue Reading
Use single sign-on technology to integrate mobile app access
Traditional security measures like password enforcement don't cut it when it comes to mobile devices. Instead, apply single sign-on technology to all in-house and external apps.Continue Reading
How secure is cellular data transmission?
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network.Continue Reading
Why IT should care about mobile privacy
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees.Continue Reading
In-app analytics take the pulse of mobile apps
If organizations don't get feedback about application use, the whole mobile environment can go up in flames. Developers need to learn how users access apps, which ones they like and what bugs are popping up. There are plenty of ways to receive ...Continue Reading
Four mobile UX design mistakes to avoid
The user experience can make or break an app, so strong mobile UX design is of utmost importance in today's enterprise development teams.Continue Reading
Android OS fragmentation curbs enterprise adoption
Google trails Apple in the enterprise mobility market. But despite fragmentation and security concerns, Android remains the only real competition to iOS.Continue Reading
Three mobile security threats IT should know
When it comes to mobile security threats, IT has more to deal with than just risky, malicious apps.Continue Reading
Refactoring turns legacy software into modern apps
It can be tough to transform traditional business processes into mobile apps, but refactoring technology helps IT bring more modern apps to fruition.Continue Reading
Mobile apps driving you mad? Try MADPs
Developing mobile apps can be costly. MADPs ease the burden by giving developers everything they need to build apps in one place.Continue Reading
EFSS combats consumer cloud storage risks
Companies wrestle with the security concern of using consumer cloud storage, but there are enterprise file sync-and-share options out there that users and IT can both love.Continue Reading
New tools plug the mobile app development skills gap
Building enterprise mobile apps is a costly endeavor, and many businesses lack in-house developers with the right skills. Finding experienced mobile app developers to hire isn't an easy task, either. For those reasons, companies are turning to ...Continue Reading
Mobile cloud apps: Development and management
Learn steps for moving mobile cloud apps on the right track with development and management.Continue Reading
How Windows 10 can turn the page on Windows 8 problems
Microsoft was off target with Windows 8, but it can still recover by pushing the concept of Windows 10 mobile devices that integrate fluidly with desktop systems.Continue Reading
Progress Software acquires development tools
Progress Software acquisitions return company to its legacy by supporting developers and development tools.Continue Reading
Four crucial enterprise mobility mistakes to avoid
Mobile initiatives are complex, but IT can keep its project on track by using analytics and recognizing the differences between mobile and desktop app development.Continue Reading
Comparing iOS 8 vs. Android 5.0 for enterprise use
The standardization provided in iOS makes it easier to manage than Android, but Google is quickly catching up with new features such as Android for Work.Continue Reading
Enterprises turn to MADPs for in-house mobile apps
Even if your organization has developers on staff, app dev is challenging. MADPs can help enterprises build and deploy the mobile apps their employees want and need.Continue Reading
Mobile app security and usability can coexist
It might not seem like it, but you can make security and usability play nice when it comes to mobile applications. Get security staff involved in app dev early on.Continue Reading
Five mobile data loss prevention tools IT needs
Protecting corporate data is a big job, but IT has a wide variety of tools at its disposal when it comes to data loss prevention.Continue Reading
Mobile content management software, EFSS protect data in the cloud era
Thanks to mobile and cloud computing, the number of potential repositories for corporate data have increased exponentially. Traditional file storage systems, content management software and device-centric security measures can only do so much to ...Continue Reading
MBaaS links mobile apps with legacy infrastructure
In this podcast, we chat with the CEO of MBaaS provider Kinvey about why he thinks MBaaS is key to keeping up with modern mobility.Continue Reading
How to vet and deliver secure mobile apps
With a growing consensus that mobile app management and security are more important than managing the device, IT needs to learn how to implement effective MAM.Continue Reading
Steer clear of mobile application security risks
Dealing with mobile application malware is a fluid process. IT needs a policy for vetting apps and educating users about potential security risks.Continue Reading
BYOD policies should balance user needs and mobile security
Bring your own device (BYOD) policies are a good way to get mobility off the ground, but they‘re not a magic pill. Every organization needs to clearly lay out its expectations for mobile workers, regardless of who owns their devices, in order to ...Continue Reading
How to empower mobile workers with remote desktop apps
Enterprise mobility initiatives are fruitless if end users don’t buy in. IT and business leaders must deliver a high-quality user experience and implement agile, mobile-friendly workflows to get employees on board. Merely providing connectivity isn’...Continue Reading
MDM puts mobile geofencing, geolocation services on the map
The GPS chips in today's mobile devices, combined with most MDM products' geofencing and geolocation features, pack a powerful punch for IT security.Continue Reading
Mobile asset management gives MDM more visibility
Mobile asset management gives IT new insight into employees' smartphone and tablet usage -- who owns them, their condition and more. It's a strong complement to MDM.Continue Reading
Mobile content management 101: Why you need MCM tools
As enterprise mobility management becomes more complex, IT shops need a more efficient way to control security. MCM tools can help.Continue Reading
What Microsoft EMM offers and how it compares
Microsoft's EMM platform is an easy buy-in for companies already using Windows services, but does it compare well to AirWatch EMM and others?Continue Reading
How to install CyanogenMod for rooting Android devices
There are many methods for rooting Android devices, including open source firmware such as CyanogenMod.Continue Reading
Keeping track of mobile users? Device tracking laws are still in flux
Location services can be valuable to users, but it's not always acceptable -- or legal -- for employers to track users' devices and whereabouts.Continue Reading
What IT pros need to know about the Android 4.4 KitKat OS
With a cleaned-up UI, improved security, and features for app developers, an upgrade to the Android KitKat OS has plenty to offer IT, users and devs.Continue Reading
How employees get around IT policies and restrictions
The policies that IT departments put in place are there to protect corporate data, but workers often go around those blocks to get work done.Continue Reading
Can Samsung Knox security make devices safe enough for Fort Knox?
Knox security tools help keep data safe and make Samsung devices viable even in high-security settings, but admins should enable all the features.Continue Reading
Delivering mobile apps through enterprise app stores and private clouds
The influx of mobile devices and apps has given IT departments a new mandate: Securely and efficiently deliver mobile apps to end users.Continue Reading
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases.Continue Reading
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features.Continue Reading
What Dropbox for Business has to offer admins and users
Dropbox for Business gives IT granular control over users' file sharing and storage without hindering employee productivity.Continue Reading
How to configure iPad for business use
Apple iPad Configuration Profiles and business apps turn the popular tablet into an enterprise workhorse without compromising data security.Continue Reading
Improving data and app security with SE Android
SE Android is kernel-level security that isolates applications from one another so they cannot interact, helping preserve data integrity.Continue Reading
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data.Continue Reading
Configuring Android smartphones and tablets for business use
With the right business mobile apps, Android smartphones and tablets can go from consumer toys to corporate tools.Continue Reading
Cloud storage comparison: Dropbox vs. Box
Dropbox and Box can make mobile workers more productive, but features and prices vary. Both use a 'freemium' model that scales to business class.Continue Reading
Top five mobile security concerns with consumerization
The rise of consumerization has introduced mobile security concerns for IT and users alike, including data loss and personal privacy troubles.Continue Reading