Tips
Tips
-
Four mobile UX design mistakes to avoid
The user experience can make or break an app, so strong mobile UX design is of utmost importance in today's enterprise development teams. Continue Reading
-
Android OS fragmentation curbs enterprise adoption
Google trails Apple in the enterprise mobility market. But despite fragmentation and security concerns, Android remains the only real competition to iOS. Continue Reading
-
Why enterprise iOS support continues to rise
Apple has unseated BlackBerry at the top of the enterprise mobility market and made Windows an afterthought. Android is making efforts to gain ground. Continue Reading
-
Three mobile security threats IT should know
When it comes to mobile security threats, IT has more to deal with than just risky, malicious apps. Continue Reading
-
Three ways AirWatch secures mobile Office365 applications
With AirWatch by VMware, IT can manage Office365 applications on users’ mobile devices – all the while making sure those apps are secure. Continue Reading
-
Should you upgrade to 802.11ac wireless LAN?
Organizations need to cut through the noise of new 802.11ac wireless LAN offerings and determine if mobile users really need 1.3 Gbps throughput. Continue Reading
-
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools. Continue Reading
-
What to look for in mobile app development platforms
Mobile app development platforms can make developing mobile apps simple, but these services have a few shortcomings to watch out for. Continue Reading
-
How 2-in-1 tablets fit into the enterprise
Enterprise users who want to be freed from their PC but maintain that functionality can turn to the burgeoning 2-in-1 market. Continue Reading
-
Mobile apps driving you mad? Try MADPs
Developing mobile apps can be costly. MADPs ease the burden by giving developers everything they need to build apps in one place. Continue Reading
-
Marry MDM and Managed Open In for better iOS data security
Mobile device management just isn't enough anymore for some enterprises. Apple's open-in management feature can provide an extra layer of app security on iOS devices. Continue Reading
-
Mobile cloud apps: Development and management
Learn steps for moving mobile cloud apps on the right track with development and management. Continue Reading
-
Are SaaS ALM tools the right choice for mobile application design?
SaaS ALM for mobile apps has become a proven strategy that your company should consider when designing for Agile and cloud applications as well. Here’s why. Continue Reading
-
MAM ensures mobile data security in ways MDM can't
IT can add several important controls through mobile application management, such as app wrapping, containerization, lifecycle management and enterprise app stores. Continue Reading
-
Weighing pros and cons of mobile application management
Rather than focusing on gaining access to users' devices, MAM puts the power squarely in IT's hands to protect mobile applications on any device. Continue Reading
-
Four crucial enterprise mobility mistakes to avoid
Mobile initiatives are complex, but IT can keep its project on track by using analytics and recognizing the differences between mobile and desktop app development. Continue Reading
-
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
How to manage the scope of your mobility initiative
Even the most well-conceived mobility initiatives can turn into projects too big to pull off. Don't let the thought of what else is possible distract from your original goal. Continue Reading
-
Why Android 5.0 doesn't measure up to iOS 8 security
Google is closing the gap on Apple when it comes to mobile OS security, but Android is still more vulnerable to malware and corporate data loss than iOS. Continue Reading
-
Beware of the BDaaS double boomerang
As big data increases, the ability to access and control that data becomes a power struggle for IT. Learn why BDaaS impacts inner company relations. Continue Reading
-
Comparing iOS 8 vs. Android 5.0 for enterprise use
The standardization provided in iOS makes it easier to manage than Android, but Google is quickly catching up with new features such as Android for Work. Continue Reading
-
Shaping your content management strategy around mobility
Embracing mobility means updating the way you manage company data. IT should use options such as secure containers and enterprise-grade cloud services. Continue Reading
-
Take advantage of the first wave of Apple Watch apps
Consumers may soon be bringing Apple Watches into the enterprise, and IT should seize the opportunity to boost productivity. Learn more about the first Apple Watch applications. Continue Reading
-
Maximize your business' mobile budget by understanding TCO
IT's focus is on productivity and security, but shrewd enterprises also pay attention to ROI for their capital and operational expenses around mobility. Continue Reading
-
Mobile app development tools to improve user experience
A new series from HP was created to help app developers get an edge on user experiences, dissatisfaction and habits. Continue Reading
-
Five mobile data loss prevention tools IT needs
Protecting corporate data is a big job, but IT has a wide variety of tools at its disposal when it comes to data loss prevention. Continue Reading
-
Is fail fast the next trend in app development?
Fail fast -- the idea of embracing failure as an option -- is set to be the latest business trend of 2015, according to recent predictions. Are you ready? Continue Reading
-
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process. Continue Reading
-
How to vet and deliver secure mobile apps
With a growing consensus that mobile app management and security are more important than managing the device, IT needs to learn how to implement effective MAM. Continue Reading
-
Steer clear of mobile application security risks
Dealing with mobile application malware is a fluid process. IT needs a policy for vetting apps and educating users about potential security risks. Continue Reading
-
Prepare for WYOD management and security challenges
Enterprise wearables will soon usher in the age of wear your own device, but IT needs to ready itself for the management and security challenges of WYOD. Continue Reading
-
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps. Continue Reading
-
Three mobile containerization methods for guarding corporate data
For security reasons, IT departments prefer that business processes live in a different environment than personal data on mobile devices. Containerization makes that possible. Continue Reading
-
Teaching developers UX analysis boosts mobile app performance
Employees can be fickle over which mobile applications they use. That's why it's smart to monitor user experience and tweak apps to better meet user expectations. Continue Reading
-
Crafting a bring your own device security policy
Bring your own device initiatives are now commonplace in the enterprise, but any BYOD policy is incomplete without addressing acceptable use, enforcement and privacy. Continue Reading
-
Move to workforce mobility demands vigilance
Enterprises that go mobile can benefit from increased productivity, but only if they craft policies and use products that monitor access and secure data. Continue Reading
-
How much corporate data access should BYOD users have?
Mobile access to company data is one of the surest ways to boost productivity, but IT often has to weigh those benefits against the security risks of bring your own device (BYOD). Continue Reading
-
BYOD reimbursement: Managing enterprise mobile expenses
A lot of enterprises struggle with the financial side of the bring your own device model, so it's important to develop a smart system for compensating employees. Continue Reading
-
Three iOS enterprise features IT still needs
There's a reason why iOS is so widely used in the enterprise, but IT pros have identified a few features they still need to achieve peak functionality. Continue Reading
-
Is Apple Touch ID security ready for enterprise adoption?
Touch ID is now available for integration into native iOS and third-party applications, opening up a wide array of uses. Now, the ball is in enterprise IT's court. Continue Reading
-
New iOS mobile app management features focus on data
Clearly, Apple has noticed the trend toward iOS mobile app management, expanding collaboration with native apps in iOS 8 while also focusing on data security. Continue Reading
-
Apple's iOS 8 MDM features get IT and users on the same page
Apple set out on a dual mission with iOS 8, expanding device management and security, but also trying to win over users with transparency about MDM. Continue Reading
-
Three ways to get user buy-in for enterprise mobile apps
Developing your own enterprise mobile apps can be a good idea, but remember that their success hinges on user buy-in. There are several ways to improve your chances of winning over the workforce. Continue Reading
-
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box. Continue Reading
-
Mobile app support should outweigh device preferences
Don't let consumer popularity cloud your decision-making process when it comes to enterprise device options. Mobile app support is a far more important consideration. Continue Reading
-
Windows and mobile apps must be different to be successful
Mobile apps have different use cases and less real estate than desktop apps do. Mobile apps that follow in PC apps' footsteps are doomed to fail. Continue Reading
-
Mobile application management comparison: App wrapping vs. containerization
App wrapping and containerization are key components of MAM. They aim to solve the same problem but go about it very differently. Continue Reading
-
Multifactor authentication isn't a security cure-all
Multifactor authentication is a login security method that's picking up momentum in the business world, but IT shouldn't overlook its blemishes. Continue Reading
-
Location-based mobile management raises employee privacy concerns
Tracking users' smartphones and tablets helps secure the devices and their data, but it also opens up a Pandora's box when it comes to privacy. Continue Reading
-
MDM puts mobile geofencing, geolocation services on the map
The GPS chips in today's mobile devices, combined with most MDM products' geofencing and geolocation features, pack a powerful punch for IT security. Continue Reading
-
Open-in management helps secure iOS data
Apple's open-in management compartmentalizes apps and lets IT admins restrict sharing of corporate data. It's basic MAM built into iOS. Continue Reading
-
How mobile remote desktop apps work
Remote desktop apps can serve as a starting point for enterprise mobility. They make Windows available anywhere, and IT can manage them easily. Continue Reading
-
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
-
Apple iOS 8, iPhone 6 improve IT security and control
The expansion of passcode protection, Touch ID and device management features make Apple's latest devices and OS worth the enterprise upgrade. Continue Reading
-
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat. Continue Reading
-
Behind every good mobile device security policy is an educated staff
Implementing a mobile device security policy is a good first step, but if employees don't understand its importance, it may be all for naught. That's where training comes in. Continue Reading
-
Protect your network and data from internal threats
As the Edward Snowden case shows, there's no such thing as absolute security. That doesn't mean you shouldn't try to secure your network as much as possible. Continue Reading
-
Mobile asset management gives MDM more visibility
Mobile asset management gives IT new insight into employees' smartphone and tablet usage -- who owns them, their condition and more. It's a strong complement to MDM. Continue Reading
-
How to choose the right EMM provider for your business
Evaluate your enterprise mobility needs before considering any EMM vendors. Then ask the right questions about features, support and integration. And make sure to choose a provider that will evolve with the market. Continue Reading
-
CDMA vs. GSM: Do consumers still care?
As cellular technology develops, the carrier fights over standards like CDMA vs. GSM are starting to matter less and less. With LTE becoming the new standard, just how important are these differences to consumers? Continue Reading
-
BYOD or COPE: Which enterprise mobility strategy is right for you?
COPE has emerged as a promising BYOD alternative, but it can cause just as many problems if not approached correctly. Continue Reading
-
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform. Continue Reading
-
IT lessons learned: Managing your house like your data center
Technologies that manage your home are now part of the consumer market, so you can bring lessons from the data center into your 'smart' house. Continue Reading
-
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading
-
Top techniques for mobile data loss prevention
To protect data on mobile devices, you need data loss prevention methods like dual persona technology to keep corporate information secure. Continue Reading
-
Five alternatives to Microsoft for mobile office applications
There are plenty of alternatives to Microsoft Office out there. Check out other mobile office apps that help you view and edit docs. Continue Reading
-
Mobile content management 101: Why you need MCM tools
As enterprise mobility management becomes more complex, IT shops need a more efficient way to control security. MCM tools can help. Continue Reading
-
What Microsoft EMM offers and how it compares
Microsoft's EMM platform is an easy buy-in for companies already using Windows services, but does it compare well to AirWatch EMM and others? Continue Reading
-
How to install CyanogenMod for rooting Android devices
There are many methods for rooting Android devices, including open source firmware such as CyanogenMod. Continue Reading
-
Keeping track of mobile users? Device tracking laws are still in flux
Location services can be valuable to users, but it's not always acceptable -- or legal -- for employers to track users' devices and whereabouts. Continue Reading
-
What IT pros need to know about the Android 4.4 KitKat OS
With a cleaned-up UI, improved security, and features for app developers, an upgrade to the Android KitKat OS has plenty to offer IT, users and devs. Continue Reading
-
How employees get around IT policies and restrictions
The policies that IT departments put in place are there to protect corporate data, but workers often go around those blocks to get work done. Continue Reading
-
Can Samsung Knox security make devices safe enough for Fort Knox?
Knox security tools help keep data safe and make Samsung devices viable even in high-security settings, but admins should enable all the features. Continue Reading
-
Delivering mobile apps through enterprise app stores and private clouds
The influx of mobile devices and apps has given IT departments a new mandate: Securely and efficiently deliver mobile apps to end users. Continue Reading
-
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases. Continue Reading
-
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features. Continue Reading
-
What Dropbox for Business has to offer admins and users
Dropbox for Business gives IT granular control over users' file sharing and storage without hindering employee productivity. Continue Reading
-
How to configure iPad for business use
Apple iPad Configuration Profiles and business apps turn the popular tablet into an enterprise workhorse without compromising data security. Continue Reading
-
Improving data and app security with SE Android
SE Android is kernel-level security that isolates applications from one another so they cannot interact, helping preserve data integrity. Continue Reading
-
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
-
Configuring Android smartphones and tablets for business use
With the right business mobile apps, Android smartphones and tablets can go from consumer toys to corporate tools. Continue Reading
-
Cloud storage comparison: Dropbox vs. Box
Dropbox and Box can make mobile workers more productive, but features and prices vary. Both use a 'freemium' model that scales to business class. Continue Reading
-
Top five mobile security concerns with consumerization
The rise of consumerization has introduced mobile security concerns for IT and users alike, including data loss and personal privacy troubles. Continue Reading
-
Does a corporate app store make sense for your organization?
In the first of a three-part series, contributor Tom Nolle explains how to determine whether a corporate app store makes sense for your organization. Continue Reading
-
Limiting mobile bandwidth consumption to improve network performance
When a lot of devices access your network, the network slows down. Adding WAPs and upgrading the LAN can help you limit bandwidth consumption. Continue Reading
-
Pros and cons of mobile desktop virtualization
There are use cases for delivering virtual desktops to smartphones and tablets, but mobile desktop virtualization comes with usability issues. Continue Reading
-
Are MDM tools as secure as you think?
MDM tools help protect devices and corporate data, but they have vulnerabilities. MDM shouldn't be the only component of your security strategy. Continue Reading
-
A technical deep dive on iOS app distribution
The rules around iOS app distribution vary depending on the type of app. Deployment options abound, but none are a piece of cake. Continue Reading
-
How personal cloud-based services jeopardize corporate data security
Often unwittingly, workers using personal cloud-based services put corporate data at risk. Files can leak from or can be accidentally made public. Continue Reading
-
Integrating MDM tools with enterprise data and applications
When your MDM tools integrate well with existing enterprise systems, data and applications, it can improve employee productivity and IT workflows. Continue Reading
-
Fitting MDM products into your existing infrastructure
MDM products must monitor various devices, enforce corporate policies and integrate with existing hardware, software and IT management workflows. Continue Reading
-
The five components of a successful bring-your-own-device policy
Crafting a comprehensive bring-your-own-device policy can make your BYOD program successful. Be sure to consider security, training and more. Continue Reading
-
How cloud storage and collaboration are changing email communications
Email communications aren't dead, but social networking, cloud storage and collaboration tools have made it easier for employees to work together. Continue Reading
-
Protecting the corporate network with a mobile device security strategy
With a security strategy that includes device discovery and impact assessment, you can protect your corporate network from some mobile device dangers. Continue Reading
-
Introduction to iPad administration
You can use Apple Configurator and over-the-air methods to send configuration profiles to iPads, giving you more control over iPad administration. Continue Reading
-
Advanced mobile device management software capabilities to consider
Once you have the basics of MDM down, it's time to look into more advanced mobile device management software for service, app and document management. Continue Reading
-
Basic features and capabilities to look for in MDM tools
Choosing the best mobile device management tools can be tricky. Success requires matching product capabilities to mobile workforce needs. Continue Reading
-
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies. Continue Reading
-
Top 10 BYOD pitfalls to avoid if you allow personal devices
If your company allows personal devices, make sure you know which mistakes to avoid, such as locking down devices and going without a BYOD policy. Continue Reading
-
Using Microsoft Exchange ActiveSync for MDM: What you can and can't do
Many companies use Microsoft Exchange ActiveSync to give users email access, but its limitations prevent it from being a full MDM tool. Continue Reading