New & Notable
Enterprise mobility strategy and policy News
May 14, 2019
Dell's Latitude PCs get a new look and new features that could make it easier for IT admins to support a mobile workforce, according to analysts.
February 04, 2019
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
July 24, 2017
As more vendors bundle enterprise mobility management into suites, it's important for organizations to be aware of the different ways to buy the technology.
April 24, 2017
More developers have bought into AppConfig's common mobile application management features so they can target a larger share of the EMM market. But not all vendors are on board.
Enterprise mobility strategy and policy Get Started
Bring yourself up to speed with our introductory content
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are. Continue Reading
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
Evaluate Enterprise mobility strategy and policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans. Continue Reading
As UEM tools begin to add IAM features and vice versa, IT should consider ways to bridge the gap. Determine how to combine the capabilities of each tool. Continue Reading
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios. Continue Reading
Manage Enterprise mobility strategy and policy
Learn to apply best practices and optimize your operations.
Mobile chatbots that include AI technologies can help organizations simplify user and IT workflows. Learn exactly how these chatbots can fit within a mobility management strategy. Continue Reading
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly. Continue Reading
Problem Solve Enterprise mobility strategy and policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
IT must factor mobile users into its security plan. Intrusive applications and stolen devices are major security issues, but IT can account for these threats with proper planning. Continue Reading
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction. Continue Reading