New & Notable
Enterprise mobility strategy and policy News
August 13, 2019
The capabilities that come with connecting your smartphone to your PC can have substantial benefits for end users, according to analysts, as Samsung and Microsoft partner.
June 28, 2019
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems.
May 14, 2019
Dell's Latitude PCs get a new look and new features that could make it easier for IT admins to support a mobile workforce, according to analysts.
February 04, 2019
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
Enterprise mobility strategy and policy Get Started
Bring yourself up to speed with our introductory content
Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device. Continue Reading
IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger ... Continue Reading
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market. Continue Reading
Evaluate Enterprise mobility strategy and policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
At JNUC 2019, Apple admins gather to discuss their management practices, issues and success stories. Mobile admins who manage iPhones should look into these sessions. Continue Reading
Explore UEM tools and how they can both secure endpoints and keep them working effectively in this fast-paced, global economy. Continue Reading
UEM tools are essential to oversee the many endpoints that reside in companies today. Read this comprehensive roundup to learn more about the leading products on the market. Continue Reading
Manage Enterprise mobility strategy and policy
Learn to apply best practices and optimize your operations.
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best Managed Home Screen Android management options. Continue Reading
Organizations with managed mobile users need to develop a smartphone policy, on everything from data use to app installation, to ensure security and smooth business processes. Continue Reading
Problem Solve Enterprise mobility strategy and policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
IT must factor mobile users into its security plan. Intrusive applications and stolen devices are major security issues, but IT can account for these threats with proper planning. Continue Reading