Tips
Tips
-
Why you need an enterprise mobile data backup strategy
Most organizations realize the need to back up enterprise mobile data, but they don't all do it. Implementing a mobile backup strategy is the first step. Continue Reading
-
Track mobile costs with telecom expense management software
TEM software can help IT administrators gain insight into mobile users and uncover cost savings. It's often part of larger mobility services these days. Continue Reading
-
Build mobile app stores in six steps
Organizations that build their own mobile app stores can make life easier for IT admins tasked with monitoring what apps employees use and keeping them secure. Continue Reading
-
RMAD tools enhance app dev but come with tradeoffs
Organizations looking to create their own mobile apps may choose RMAD tools over building native apps from scratch. It seems like a quick fix, but RMAD has its downsides, too. Continue Reading
-
Tips for implementing a blockchain mobile security strategy
When considering mobile security, think of blockchain. Follow these tips to determine whether the security attributes of blockchain could be of benefit to your organization. Continue Reading
-
Four tips for reducing mobile app development costs
Don't get stuck with hidden fees and unnecessary designs with mobile app development. Cut off the high sticker price by focusing on the user experience and going cross-platform. Continue Reading
-
Pros and cons of Dropbox Business for enterprise file sharing
Dropbox Business is an alternative for business file sharing that offers more IT control. But, like other file-sharing services, it has drawbacks, too. Continue Reading
-
Top 5 EMM implementation considerations
The wrong move can make or break your enterprise mobility management implementation. Broad device support, automated enrollment and single sign-on are must-have features. Continue Reading
-
How IT and end users can build mobile apps with RMAD tools
RMAD tools can make just about anyone a citizen developer, making building mobile apps easier for IT pros or end users. The tough part is finding the right platform. Continue Reading
-
How to set up two-factor authentication for enterprise users
The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT's mobile security arsenal and learn how to set it up. Continue Reading
-
Enterprise app stores improve mobile app discovery, provisioning
There are plenty of ways to get mobile apps to users nowadays. With an efficient app provisioning and launching process, enterprise stores may be just the ticket. Continue Reading
-
Android vs. iOS security: Compare the two mobile OSes
The latest versions of both Android and iOS up the security ante with encryption and other features. It's up to IT which devices to support, whether Apple or Google. Continue Reading
-
Seven secret mobile security tips IT should know
Mobile security threats are lurking around every corner. IT admins should encourage advanced security on smartphones and schedule security updates to keep everyone's guard up. Continue Reading
-
How EMM tools have changed with the market
With so many EMM vendors fusing over the years, EMM suites have evolved beyond mobile device management and offer more capabilities. IT can expect to see more suite changes ahead. Continue Reading
-
Wi-Fi troubleshooting checklist for mobile devices
With an ever-growing mobile workforce, Wi-Fi is an essential part of business today. But all mobile devices can hit Wi-Fi snags. Luckily, IT has plenty of ways to untangle the mess. Continue Reading
-
How to overcome common enterprise mobility challenges
Many companies lack the right policies or tools necessary to implement a successful enterprise mobility strategy. Find out what your mobile initiative might be missing. Continue Reading
-
How mobile cloud computing architecture enables modern workers
When it comes to data storage and application development, mobile cloud computing helps IT build a bridge between legacy software and new work styles. Continue Reading
-
How mobile threat detection tools spot incoming attacks
EMM configurations can help safeguard the enterprise from attacks, but mobile threat detection tools take a different approach to actively pinpoint security issues. Continue Reading
-
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
Four mobile security tips to keep in mind
When it comes to mobile security, there is no one way to do things, but there are best practices to follow. A multi-tiered approach is a great place to start. Continue Reading
-
Five mistakes companies make when creating mobile strategies
Many companies face obstacles in trying to go mobile, but not every mobile initiative has to be treacherous. IT can take steps to avoid making common strategy mistakes. Continue Reading
-
The keys IT needs to manage Windows 10 Mobile devices
IT admins tasked with enrolling and managing Windows 10 Mobile devices can turn to the operating system's built-in mobile device management client. Continue Reading
-
How IT can assure mobile employee productivity
Going mobile is an essential step for companies to take. Managers should encourage positive attitudes and set up a mobile employee for success. Continue Reading
-
How to craft the best mobile strategies for business
The best mobile strategies require careful consideration before IT can implement them. But the right plan can help any organization take advantage of all mobile has to offer. Continue Reading
-
Surface Pro 4 vs. iPad Pro in the battle for enterprise supremacy
The Surface Pro 4 brings Windows 10 to the table. The iPad Pro offers a better user experience. Which one is the right fit for your organization? Continue Reading
-
Three top mobile trends for IT to look for in 2017
IT shops need to stay on top of the latest mobile advancements, but which are the most crucial to the enterprise? Three mobile trends could dictate the future of mobility. Continue Reading
-
Top mobile security threats IT needs to know about
With mobile devices on the rise in the workplace, it is imperative to know the top security threats these devices bring with them, plus how to prevent breaches from happening. Continue Reading
-
Windows 10 Mobile apps and features to try in the enterprise
The latest version of Microsoft's mobile OS has a slew of business-friendly features. But which Windows 10 Mobile apps and tools are best for the enterprise? Continue Reading
-
How to choose and implement the best workflow apps
The best workflow apps are tailored to specific users and the business processes they rely on to do their jobs. And streamlining workflows saves companies time and money. Continue Reading
-
Alternative mobile OSes try but fail to rise in the enterprise
Alternative mobile operating systems to Android and iOS have tried but failed to unseat the key players. Does a new mobile OS even stand a chance in the enterprise? Continue Reading
-
Six must-haves for IT's mobile security checklist
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
-
The Google Authenticator app packs a two-step verification punch
There's a reason two-step verification is everywhere; it's an easy way for IT admins to authorize user accounts. The Google Authenticator app can make it easier to manage single accounts across multiple devices. Continue Reading
-
Why you need identity and access management as a service
Identity and access management is a critical part of managing today's mobile infrastructures. IT shops should consider IDaaS to help ease the burden on administrators. Continue Reading
-
Mobile browser security, compatibility should be top priorities
As mobile web apps increase in popularity, cross-platform browser compatibility becomes a top priority. IT also needs to keep an eye on browser security. Continue Reading
-
How Nougat sweetens Android for Work security features
IT admins that are hesitant to support Android devices may change their minds with Nougat, which makes several security improvements, especially in Android for Work. Continue Reading
-
How user privacy policies can quell IT spying fears
If users feel like somebody's watching them, they could be right, but it's probably not IT spying. Companies need user privacy policies to ease employees' minds and protect data. Continue Reading
-
Get to know Samsung Knox security features and uses
Samsung Knox is a military-grade mobile security platform for the enterprise, with more customization capabilities and management options than iOS devices. Continue Reading
-
VMware AirWatch policy and configuration tips you might not know about
There are some under-the-radar features that IT pros can take advantage of when it comes to VMware AirWatch configuration and policy settings. Automation can also be beneficial. Continue Reading
-
How the AppConfig Community sets the MAM standard
An assembly of EMM vendors and developers continue their quest to standardize mobile app configuration and management technology across iOS, Android and Windows platforms. Continue Reading
-
Mobile means constant change for enterprise app developers and IT
Mobile app developer challenges aren't going away. They're changing along with the landscape of new devices and OSes. IT shops must prioritize to help ease developer woes. Continue Reading
-
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
-
Take apps to the next level with mobile device features
To build more advanced business apps, IT should incorporate the latest mobile device features, such as geolocation data, integrated communications and specialized sensors. Continue Reading
-
Get to know mobile app dev tools from the major ISVs
The big four independent software vendors -- IBM, Microsoft, Oracle and SAP -- are getting in on the mobile app dev game with new tools. There are several that IT pros can give a spin. Continue Reading
-
So you want to deploy VMware Identity Manager?
Identity Manager provides user authentication and access control, both in the cloud and on-premises. VMware provided an overview of both models in a VMworld 2016 session. Continue Reading
-
IT, not BYOD users, must control mobile device encryption
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks. Continue Reading
-
BlackBerry-Good deal pushes company toward mobile services market peak
BlackBerry is moving from a hardware focus to a software focus. Thanks in part to its acquisition of Good Technology, the company is poised for a smooth transition. Continue Reading
-
Why sideloading Android apps is risky business
Android users seeking an app outside of their device's official app store can circumvent the system through sideloading. But the process puts enterprise devices and data at risk. Continue Reading
-
Why every IT shop should have a mobile BI strategy
When business intelligence meets mobility, it changes the way IT shops operate. This is why mobile BI is becoming a key cog in the enterprise machine. Continue Reading
-
Why it's good the mobile handset market is boring
From version to version, mobile device releases aren't that different. It might make for a boring news cycle, but it keeps prices down and simplifies the learning curve for users and IT. Continue Reading
-
The basics of iOS application development
Developing iOS apps is a multi-tiered process, starting with choosing the right design platform and programming language and ending with a user-friendly native app. Continue Reading
-
Why IT needs mobile data analytics
Mobile users have a need for speed, which gives IT some data processing headaches. But new mobile data analytics tools help IT process data in real time and improve user experience. Continue Reading
-
Layered security is IT's best defense
Mobile devices aren't the only thing putting the enterprise network at risk. IT admins must grapple with a host of security threats, requiring a layered security model. Continue Reading
-
Apple iOS data protection FAQ
Apple devices are tough to crack, but that doesn't make them immune to security threats. Find out the answers to frequently asked questions on the best iOS data protection methods. Continue Reading
-
How to choose the best mobile application development platform
When searching for a mobile application development platform it is important to keep several factors in mind, including whether you want a cloud or on-premises offering. Continue Reading
-
Put Wi-Fi analytics on the front burner
Wi-Fi analytics changes the way IT manages both mobile devices and the enterprise network. IT can use it to optimize network performance and problem-solve in real time. Continue Reading
-
Enterprise file-sharing technology requires mobile app integration
EFSS platforms are critical to enabling today's mobile workers. But to be truly successful, file-sharing apps must integrate with other apps to allow for document manipulation. Continue Reading
-
Eight Apple iOS data protection best practices IT should follow
With Apple devices in demand in the enterprise, iOS data protection is needed now more than ever. IT has options when it comes to keeping iOS devices secure. Continue Reading
-
Eight factors when choosing mobile application development tools
When it comes to picking out a mobile app development tool it is important to keep lifecycle management, integration, internal expertise and more in mind. Continue Reading
-
Five ways to secure mobile data with EMM
For most organizations it's a matter of when, not if, their data will be attacked. But EMM tools can help keep mobile data secure. Continue Reading
-
Mobile identity management best practices
IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading
-
What's new with mobile application management software?
Mobile application management software has come a long way since the days when operating systems barely had any app-level controls. Continue Reading
-
Explore types of mobile app development platforms
Smaller organizations without development expertise may use low-code tools, but large enterprises will need agnostic platforms that come with back-end hooks. Continue Reading
-
BYON brings its own security challenges
Bring your own device is a common practice, and now bring your own network is on the scene -- whether IT likes it or not. Continue Reading
-
How to select app development frameworks: Native vs. Web vs. hybrid
IT should take into account device integrations and access methods when choosing which types of apps to develop and deliver. Continue Reading
-
Four ways a mobility project can transform your business
To truly embrace mobility, rethink the way organizations do business. With a well-planned mobility project, IT can help companies increase revenue and make employees more productive. Continue Reading
-
Why IT should consider managed mobility services
It may be scary to turn mobility management over to a service provider, but many organizations don't have the expertise or resources to do it themselves. Continue Reading
-
Introduction to BlackBerry enterprise mobility management
BlackBerry was once synonymous with smartphones, before the dawn of the iPhone. The BlackBerry enterprise business is now all about mobility management. Continue Reading
-
Mobile thin clients have a bright future in the cloud era
Mobile thin clients could offer the best of both worlds for the enterprise: the convenience of a mobile device, with the functions of a desktop PC -- for a fraction of the cost. Continue Reading
-
How Android app permissions work in Marshmallow
The latest Android operating system, Marshmallow, improves the mobile user experience -- and IT security -- by providing more granular control over app permissions. Continue Reading
-
How XenMobile Mail Manager helps IT manage EAS devices
XenMobile Mail Manager provides access control and remote management features for devices running Exchange ActiveSync or BlackBerry Enterprise Service. Continue Reading
-
How to balance access needs and mobile data security concerns
Mobile workers need to access corporate data, but giving them open access is often easier said than done. Businesses must balance users' wants with mobile data security concerns. Continue Reading
-
Three ways to help users access mobile data
There's no shortage of enterprise file sync-and-sharing services available to provide access to mobile data, but they're not the only option, and they're not right for every organization. Continue Reading
-
Make mobile data access and security top priorities
Information is king for today's workers, but it isn't always as easy as it should be to access mobile data. Businesses must also consider mobile data security. Continue Reading
-
Understand Android for Work features and challenges
Google hasn't had a great track record when it comes to enterprise security and management capabilities on its Android OS, but Android for Work changes all that. Continue Reading
-
How AirWatch enrollment and security measures work
The AirWatch enrollment process is fairly simple from the user's perspective. Learn how SSO and other security features affect the AirWatch EMM user experience. Continue Reading
-
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail. Continue Reading
-
Three steps to a successful mobile initiative
A successful mobile initiative requires changes to core business process -- an obstacle that's hard, but not impossible, to overcome. Continue Reading
-
Unified endpoint management shows promise in early days
Not many products fulfill the promise of unified endpoint management today, but many are working towards that goal. Continue Reading
-
Make EMM part of a broader mobile enterprise strategy
Management alone does not make for a successful mobile enterprise strategy. Businesses need to help workers with apps and access to corporate data. Continue Reading
-
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading
-
How Universal Windows Platform apps work
Microsoft's Universal Windows Platform promises apps that can run on any Windows device, from a PC to HoloLens. But in the enterprise, interest in UWP apps is muted. Continue Reading
-
AirWatch vs. XenMobile EMM: Which is right for you?
When evaluating AirWatch and XenMobile EMM products, consider their MDM, MAM and mobile email capabilities. And don’t overlook their IT admin consoles. Continue Reading
-
How to balance mobile device privacy vs. security
If employers are transparent with workers and respect their mobile device privacy concerns, workers will be more accepting of their security measures. Continue Reading
-
Top trends in enterprise mobility suites for 2016
Consolidation, customization and the cloud will all have major ramifications for enterprise mobility suites in the new year. Keep an eye on mobile app and content management, too. Continue Reading
-
New iOS security features are all about the apps
Expanded per-app VPNs, the new Trust user interface and changes to the Device Enrollment Program give IT more flexibility when it comes to iOS security. Continue Reading
-
Getting started with the SAP Mobile Platform and HANA Cloud Platform
The SAP Mobile Platform and HANA Cloud Platform simplify mobilizing SAP apps for developers with features such as Syclo Agentry and push API. Continue Reading
-
VMI brings virtual mobile apps to any device
Virtual mobile apps can provide extra security for devices and data, and VMI -- much like its predecessor, VDI -- makes them a reality. Continue Reading
-
In your face: Mobile device authentication leans on biometrics
Facial recognition, fingerprint sensors and other advanced mobile device authentication technologies are the future of smartphone, tablet and Internet of Things security. Continue Reading
-
Compare the iPad Pro vs. Surface Pro 4 for business use
With built-in Office and a keyboard, Microsoft's Surface tablet is geared toward the enterprise. Now, the Apple iPad Pro stands up to the latest version of Microsoft's device, the Surface Pro 4. Continue Reading
-
Apple iOS 9 features aim to make the OS enterprise friendly
With some new iOS 9 features, Apple has centered its attention on the enterprise, offering better application and device management through the VPP and DEP. Continue Reading
-
How iOS configuration profiles give IT stricter settings control
To assert more control over users' devices, IT admins can install iOS configuration profiles on iPads and iPhones that allow them to change device settings. Continue Reading
-
Understanding EMM software
There are six components to mobility management software, and they all play a part in enabling a secure mobile workforce. But their overlap can lead to complexity. Continue Reading
-
How to deploy IBM MaaS360 for EMM
MaaS360, IBM's cloud-based EMM service, provides MAM, secure document sharing and a simple cross-platform management interface. Continue Reading
-
Connected car technology will drive business productivity
As more vehicles get Wi-Fi and self-driving capabilities, occupants will be able to do more on the go. Connected car technology has a promising future for business users. Continue Reading
-
What you need to know about iPad MDM
Apple and many third-party vendors offer iPad mobile device management products. Take a look at what they can and can't do before jumping into the MDM waters. Continue Reading
-
Apple's iPhone 6s features make business users more productive
The iPhone 6s and 6s Plus could have a role in the enterprise with new features such as 3D Touch, better Wi-Fi and LTE speeds and faster TouchID. Continue Reading
-
Microsoft Intune features help IT strike the right chord
Intune, the focal point of Microsoft's enterprise mobility management strategy, combines mobile device management and mobile application management. Continue Reading
-
Shake up your mobile workflow with design thinking
Put yourself in your end users' shoes and unlock mobility's true potential. Design thinking can lead to major mobile workflow enhancements. Continue Reading
-
How beacon technology will bring an enterprise sea change
More and more beacons are infiltrating our daily lives, and it's becoming clearer how beacon technology will affect enterprise IT. Continue Reading
-
Could collaboration software, social media unseat email?
Email is here to stay, but its functionality could soon be folded into collaboration software, social media and unified communications tools. Continue Reading