Tips
Tips
-
Top 10 BYOD pitfalls to avoid if you allow personal devices
If your company allows personal devices, make sure you know which mistakes to avoid, such as locking down devices and going without a BYOD policy. Continue Reading
-
Using Microsoft Exchange ActiveSync for MDM: What you can and can't do
Many companies use Microsoft Exchange ActiveSync to give users email access, but its limitations prevent it from being a full MDM tool. Continue Reading
-
Apple AirPrint and iOS printing alternatives: An IT overview
Getting a document from a mobile device to paper is a hassle, but there are many options to help with iOS printing, including Apple AirPrint. Continue Reading
-
Six enterprise cloud storage and file-sharing services to consider
Each enterprise cloud storage and file-sharing service has different capabilities. Know what you're getting and make sure it's the right fit. Continue Reading
-
Box security features help set some cloud concerns to rest
Box's security features include seven permission layers, authentication and MDM integration so employees can use the cloud and IT can still sleep. Continue Reading
-
How CloudGateway works to enable enterprise mobility
Through its CloudGateway product, Citrix offers an enterprise app store, app wrapping tools and more to help organizations and their users go mobile. Continue Reading
-
Best practices for improving mobile data security
MDM and MAM software give IT control over mobile data security risks. Requiring passwords, encrypting stored data and using remote wipe can help too. Continue Reading
-
Why the smartphone won't replace the business landline just yet
As more employees make work calls on their smartphones, employers may consider ditching their landlines, but that can lead to unforeseen problems. Continue Reading
-
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading
-
Data and device encryption on iOS, Android, Windows Phone and BlackBerry
The major mobile operating systems all have different data and device encryption options. Enable the right features to keep devices and data safe. Continue Reading
-
BYOD pros and cons: Spend less on devices, more on support
One of the biggest draws of BYOD is that it can save money. But where companies save on devices, they have to spend on training and support resources. Continue Reading
-
Mobile device management checklist
A well-thought-out mobile device management strategy is a key ingredient for any successful mobility deployment. Continue Reading
-
Minimizing BYOD security risks through policy and technology
You can mitigate the major BYOD security risks by implementing policies, employing the right technologies to enforce them and encrypting data. Continue Reading
-
Apple VPP makes it easier to buy iOS business apps
The Apple Volume Purchasing Program lets organizations buy public iOS business apps for employees who use iPhones and iPads for work. Continue Reading
-
How iPhone encryption and data protection work
With Apple's iPhone encryption and data protection, you can take advantage of strong security. But make sure users enable the right iOS data encryption settings. Continue Reading
-
Surface RT review: The good, the bad and the ugly
The Surface RT tablet comes with Office and has good battery life, but it has some drawbacks, too. This Surface RT review explains the pros and cons. Continue Reading
-
Where business file sharing and email meet
When files are too big to share via a corporate email account, users turn to personal email. To support big attachments, email and cloud have merged. Continue Reading
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company. Continue Reading
-
Mobile application developers debate hybrid solutions
Mobile applications developers stuck on the HTML5-native debate have a third option -- building hybrid apps. Continue Reading
-
BYOD privacy: Is Big Brother watching?
It's important to respect end users' BYOD privacy, but balancing their rights and your organization's security can be a tricky task. Continue Reading
-
Comparing mobile operating systems and application environments
Each mobile operating system has a different application environment, but that could be more of an advantage for businesses than a detriment. Continue Reading
-
Remote wipe 101: Policy and how-tos for protecting mobile data
Most mobile devices have native remote wipe capabilities. If those features aren't enough for your company, supplement them with MDM and the cloud. Continue Reading
-
Dropbox vs. Google Drive: Which is better for business?
In the Dropbox vs. Google Drive fight, there isn't a clear winner. Choosing the right one for your company will depend on what users need. Continue Reading
-
BYOD advantages: Save money, mobilize workers, embrace the cloud
BYOD can help organizations save money, implement a cloud-centric IT strategy and improve employee mobility, all of which can lead to increased productivity. Continue Reading
-
SAFE-certified devices make Android work for businesses
If your employees use SAFE-certified Android devices for work, you have tons of Samsung APIs at your disposal to make managing the devices easier. Continue Reading
-
Personal hotspots let users bring their own Internet
As more employees use personal hotspots, they can bypass the Internet filters and other controls IT has set up. But stopping this trend is hard. Continue Reading
-
Google Drive security: What IT can and can't do
For the most part, Google Drive security is out of IT's hands. User education is key, but IT can use blacklists and other controls to protect corporate data in some scenarios. Continue Reading
-
Top five mobile application vulnerabilities
Devices are often blamed for insecurities, but mobile app vulnerabilities are insidious. Make sure employees use common sense when they download apps. Continue Reading
-
Using mobile collaboration to make workers more productive
They won't take you on a magic carpet ride, but collaboration tools can improve employee productivity. Make sure yours support mobile collaboration. Continue Reading
-
Apple iPhone 5 features and iOS 6: An IT FAQ
Apple's iOS 6 and iPhone 5 are here: Get ready to tackle issues such as sky-high data charges, automatic cloud backup, Lost mode and tab syncing. Continue Reading
-
Mobile configuration management functions for successful MDM
Configuration management functions are some of the most important features of an MDM system. Make sure yours can secure files, email and passwords. Continue Reading
-
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications. Continue Reading
-
How to develop a monitoring system for mobile cloud-based applications
If your mobile workforce uses cloud-based applications to work from their smartphones and tablets, consider a monitoring system to ensure the apps are working. Continue Reading
-
Enterprise mobility management options: MDM, MAM and MIM
Forget the debate over managing devices, applications or information. The key to successful enterprise mobility management is combining the three. Continue Reading
-
How to restrict iCloud access in the enterprise
Managing Apple iCloud access is important for protecting corporate data that users may access and potentially sync to the cloud from iOS devices. Continue Reading
-
BYOD security policy considerations and best practices
You've decided to allow BYOD, but you're concerned with data and device security. What should you do next? Write up a BYOD security policy, of course. Continue Reading
-
How to plan for BYOD security
BYOD security creates challenges for enterprise IT, but admins can still control employees' devices. Set up policies to cover your bases. Continue Reading
-
Using a secure data container to separate work and play
A secure data container isn't a perfect answer to data security and BYOD, but it comes close to offering the best of both worlds for end users and IT. Continue Reading
-
BYOD cost sharing: Who pays for what?
BYOD cost-sharing plans aren't perfect, but setting boundaries and limits on devices and data can help make a bring-your-own-device program work. Continue Reading
-
How to reduce data roaming charges
If your users travel internationally, they can rack up some serious roaming bills. Five easy changes can reduce data roaming charges significantly. Continue Reading
-
Top 10 cloud-based file-sharing terms you need to know
There are tons of cloud-based file-sharing definitions to keep track of. Our guide to these top cloud terms will help keep IT from getting lost in the storm. Continue Reading
-
MDM software: Why it’s important and what it should include
MDM software has become an enterprise necessity. With so many mobile devices in the workplace, IT needs a way to manage policy, inventory and security, and MDM does just that. Continue Reading
-
Mobile operating system fragmentation: More OSes, more problems
The more mobile OSes admins come across, the more problems they see. Mobile operating system fragmentation makes it tough to manage and secure users’ smartphones and tablets. Continue Reading
-
Android versus iOS security: Features, policies and controls
There’s not a clear winner when it comes to Android versus iOS security, but with iOS’ app security in one corner and Android’s encryption in the other, it makes for a good fight. Continue Reading
-
Exchange ActiveSync mobile management FAQ
As more users bring their smartphones to work, admins turn to ActiveSync for basic management. Unfortunately, not all ActiveSync mobile management features work on all devices. Continue Reading
-
BlackBerry operating system: Should admins stay or should they go?
The BlackBerry operating system used to rock the enterprise, but now that consumer devices are the standard, admins have to decide if they will stay loyal to RIM or not. Continue Reading
-
Jailbroken device risks: What IT can (and can't) lock down
A jailbroken device gives its user more freedom and flexibility, but it could also harm the network or put data at risk. Unfortunately, IT can't do much to prevent jailbreaking. Continue Reading
-
BYOD FAQ: Answers to IT’s burning questions about BYOD
There’s no one way to handle BYOD, but this BYOD FAQ can help IT pros find the right path when it comes to application control, app delivery and BYOD policy. Continue Reading
-
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT. Continue Reading
-
Wireless carrier security risks: Keeping enterprise data safe
Wireless carrier security doesn’t make voice and data transmissions iron-clad against eavesdropping or interception. What’s worse is that there’s not much IT can do about it. Continue Reading
-
BYOD policy basics: Defining and enforcing a successful policy
A BYOD policy is critical for any organization that allows consumer devices on the network. Defining and enforcing policies can prevent problems that come in the BYOD era. Continue Reading
-
It’s a business smartphone! It’s an enterprise tablet! It’s a consumer device!
The days of the business smartphone or enterprise tablet may be numbered as consumer devices take over. IT pros need to find secure ways to integrate and manage these devices. Continue Reading
-
Business email security and the risks of personal Gmail forwarding
Business email security might not be on employees’ minds when they forward corporate mail to more user-friendly Gmail accounts, so IT should take steps to protect corporate data. Continue Reading
-
Mobile data security and compliance challenges in the enterprise
Consumer devices have put mobile data security and compliance in the spotlight. In the BYOD era, IT needs to take steps to meet these security and compliance challenges. Continue Reading
-
Top 5 business cloud app suites and cloud collaboration services
Business cloud app suites such as Google Apps and Zoho offer business cloud collaboration tools that allow employees to work more efficiently while taking some pressure off of IT. Continue Reading
-
How to create a BYOD policy
Without a comprehensive BYOD policy, IT’s just asking for management and security nightmares. Clearly spell out what users can and can’t do, and you’ll keep the boogey man at bay. Continue Reading
-
Top five personal cloud storage and file-sharing services and what they mean for IT
Personal cloud storage and file-sharing services are catching on among consumers and business users alike, but some are more enterprise-ready than others. Continue Reading
-
Mobile data encryption techniques: On-device and on-the-go
The right mobile data encryption techniques can help IT and users secure sensitive corporate data on mobile devices. Plus, they make admins feel like the 007s of the enterprise. Continue Reading
-
Four mobile app delivery options for IT to consider
A good mobile app delivery strategy helps users do their jobs better and eases IT’s management burdens. App stores, Web and cloud apps and virtualization are some of IT’s options. Continue Reading
-
How an iOS virus can infect the enterprise and what to do about it
Your users may not need iOS virus protection on their Apple devices, but if they connect them to the corporate network, iPhone and iPad malware can still wreak havoc. Continue Reading
-
Remote administration tools and your iPad: Best friends forever
The iTunes store is chock full of remote administration tools. Super-charge your iPad remote management capabilities with these apps, and you’ll be able to do more on the go. Continue Reading
-
iPhone security FAQ: Risks, fixes and the future of iPhone security
iPhone security is becoming more important as more iPhones enter the enterprise. Find out the answers to frequently asked questions about iPhone security Continue Reading
-
Using USB drive encryption to keep data secure
There are many options for USB drive encryption, from device hardware to software programs, and all of them can help keep corporate data secure Continue Reading
-
Enterprise iPhone security issues and how to address them
As the iPhone grows in popularity among business users, iPhone security issues present a formidable threat to the safety and integrity of corporate data. Continue Reading
-
Risk vs. reward: Personal cloud storage services in the enterprise
Despite the popularity of personal cloud storage, organizations should consider their risks and look at alternatives. Open source, on-site storage services are available. Continue Reading
-
How to make a BYOD program work
More users want to bring their own devices to work, but you shouldn’t implement a BYOD program without proper planning. Develop policies, get user buy-in and don’t forget security. Continue Reading
-
Android tablet security: OS features and Android security apps
Securing Android tablets with their built-in features isn’t enough. Android security apps can fight viruses and boost Android tablet security. Continue Reading
-
App stores in the enterprise: Controlling consumerization … to a point
Want to make order out of consumerization chaos? App stores can help. But be warned: Building an enterprise app store isn’t easy. Continue Reading
-
Android security issues in IT
Android security issues, especially around Android app security, make IT admins weary about enterprise support. But new versions address some risks. Continue Reading
-
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices. Continue Reading
-
Spotting the five most common iPhone and Exchange ActiveSync problems
Are your iPhone users having difficulty connecting to Exchange? Before you do anything else, check these five trouble spots. Continue Reading
-
Network access control policy: Handling smartphone access control
NAC can be helpful for laptops and desktops, but it’s limited with mobile devices. In this tip, learn how to extend NAC for smartphone access control. Continue Reading
-
Meeting technical requirements for mobile health care deployments
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
-
Windows Phone 7 security: Assessing WP7 security features
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform. Continue Reading
-
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
-
Does a mobile VDI platform make sense for your users?
Mobile VDI isn't always a good fit. Ask these five questions to determine whether a mobile VDI platform makes sense for your users. Continue Reading
-
Security tools that can boost Windows mobile security
While mobile device security isn't easy or cheap, in today's smartphone-ridden enterprise, it's a necessity. Secure your Windows endpoints with these tools. Continue Reading
-
Mobile patching is No. 1 challenge of mobile device security
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
-
Accessing mobile unified communications with virtual desktops
Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified ... Continue Reading
-
Understanding the basics of Blackberry Enterprise Server Express
A BlackBerry may not be as hip as an iPhone or an Andriod, but the company's latest free server software could maintain its reign in the enterprise. Continue Reading
-
Tablet security: Best practices for the tablet computer onslaught
Tablets are taking the enterprise by storm, and tablet security is a major concern. Find out which mobile device security best practices you're already using can apply to tablets, and which you will need to revisit to keep tablets secure. Continue Reading
-
Mobile security for tablet devices: Recognizing risk
Tablet devices are flooding into the enterprise, disrupting IT support plans and mobile security practices. Find out the business benefits and potential risks tablet devices pose. Continue Reading
-
Does Microsoft Kinect have a future in the enterprise?
It may seem like just another toy, but with its sophisticated motion-sensing technologies, Microsoft Kinect may transform enterprise desktops. Continue Reading
-
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network ... Continue Reading
-
iOS4 mobile device management features ease enterprise anxiety
New iOS4 mobile device management capabilities in Apple iPhones, iPads and iPods are allowing IT managers to more easily control iOS4-based devices with third-party mobile device management software, along with other enterprise mobile devices. Continue Reading
-
Understanding the risks mobile devices pose to enterprise security
There are many ways mobile devices and remote connectivity can put your enterprise in danger. Understanding these security vulnerabilities is crucial for protecting your systems. Continue Reading
-
Mobile client security threats shouldn't be underestimated
Malware authors haven't overlooked mobile devices, whose growing computing power now poses an inviting target. Be aware of dangers from viruses and accidental data disclosure. Continue Reading
-
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide... Continue Reading
-
LTE service lacks support for voice and SMS messaging
Many telecommunications experts have touted the benefits of 4G Long Term Evolution (LTE) mobile cellular technology and its promise of an era of high-speed mobile broadband that will enable smooth video streaming and fast Web browsing. But what ... Continue Reading
-
Managing mobile device diversity
In a perfect world, your entire workforce would carry one or two well-chosen mobile devices that could be managed easily and effectively through a single platform. Unfortunately, few IT managers enjoy this luxury – most must deal with an ... Continue Reading
-
Mobile Device Manager joins Windows domains to mobile devices
Microsoft's Mobile Device Manager gives IT managers better tools and added network support to improve management of devices that run Windows Mobile 6.1. Continue Reading
-
Mobile security threats
Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile ... Continue Reading
-
Understanding mobile convergence
Mobile convergence is simply the implementation of mobile handsets and similar devices that incorporate more than one radio, with the ability to hand off a connection between these otherwise incompatible physical layers. The objective is to converge... Continue Reading
-
Boosting business productivity with Bluetooth
Bluetooth wireless connectivity has been creeping quietly into many of the devices that workers carry into the enterprise every day. ABI predicts that roughly half of the 1.2 billion cell phones sold this year will include Bluetooth. IMS Research ... Continue Reading
-
Remote user security checklist
The security of remote systems has become more critical as growing numbers of distributed workforces are removed from a controlled central network. CISSP Kevin Beaver provides a list of items to lock down on remote systems. Continue Reading
-
WiMAX devices
WiMAX devices will become more readily available as carriers deploy widespread WiMAX service. Continue Reading
-
WiMAX security
Introduction A lot has been written on the topic of WiMAX radio technology, but what about WiMAX security? Should users feel safe that their transmitted data is free from eavesdropping and manipulation? How does a WiMAX operator ensure that only ... Continue Reading
-
WiMAX performance
Sprint and Clearwire formed a $14.5 billion joint venture a few weeks ago that will focus entirely on mobile WiMAX. The joint venture will be called Clearwire and includes investment from Google, Intel, Comcast, Time Warner, and Bright House ... Continue Reading
-
Government regulations and mobile security policies
Learn how government regulations affect your mobile security policy. Continue Reading
-
WiMAX services
WiMAX, a new business opportunity for service providers, is being offered in various stages by both new and established service providers. Continue Reading