New & Notable
Enterprise mobility strategy and policy News
March 02, 2020
As the coronavirus continues to spread, the organizers of some technology conferences have decided to alter or cancel their events for the safety of attendees.
August 13, 2019
The capabilities that come with connecting your smartphone to your PC can have substantial benefits for end users, according to analysts, as Samsung and Microsoft partner.
June 28, 2019
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems.
May 14, 2019
Dell's Latitude PCs get a new look and new features that could make it easier for IT admins to support a mobile workforce, according to analysts.
Enterprise mobility strategy and policy Get Started
Bring yourself up to speed with our introductory content
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device. Continue Reading
IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger ... Continue Reading
Evaluate Enterprise mobility strategy and policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This guide provides information on remote technologies that IT teams can quickly deploy to support employees who must work from home to prevent the spread of COVID-19. Continue Reading
Organizations must pick the right OTA update architecture to ensure IoT devices receive the latest changes more efficiently and with less of an effect on your organization. Continue Reading
At JNUC 2019, Apple admins gather to discuss their management practices, issues and success stories. Mobile admins who manage iPhones should look into these sessions. Continue Reading
Manage Enterprise mobility strategy and policy
Learn to apply best practices and optimize your operations.
Learn how IT must take a holistic management approach to stop every mobile threat that comes its way with the right tools, policies and device-specific best practices. Continue Reading
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it. Continue Reading
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
Problem Solve Enterprise mobility strategy and policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Keeping technology updated will become even more critical with IoT devices. Over-the-air updates can ease the process if administrators know how to address the obstacles. Continue Reading
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading