July 24, 2017
As more vendors bundle enterprise mobility management into suites, it's important for organizations to be aware of the different ways to buy the technology.
July 20, 2017
All future Chromebook releases will support Android apps, which brings concerns regarding their security, management and overall usefulness as thin clients.
July 12, 2017
Sanjay Poonen, VMware's chief operating officer, actively promotes his company on Twitter -- sometimes at the expense of competitors. In the past few weeks, Poonen tweeted a news story about ...
June 26, 2017
BlackBerry's reinvention as a software company isn't going so well. The BlackBerry software business shrunk in the first quarter, falling short of analysts' expectations in the process. Those ...
EMM Get Started
Bring yourself up to speed with our introductory content
IT administrators today have a big job: ensuring that end users' needs are met in an ever-changing mobile and desktop computing landscape. Part of this includes getting more involved with enterprise mobile application development. This month's cover story from editor in chief Colin Steele explores how enterprise mobile application development fits into IT's overall end-user computing strategy and what technologies are available to help fuse the two sides.
This issue also recaps the winners of the Best of Citrix Synergy Awards from this year's conference in Orlando, Fla. Plus, columnists dig into the ways cloud influences mobility and why organizations should move from physical to virtual desktops. For a more in-depth look at one desktop virtualization approach, readers can check out Gabe Knuth's Deep Dive on Remote Desktop Session Host. Finally, IT pros share how they take advantage of social collaboration software in their enterprises.Continue Reading
Walk the corridors of any modern hospital, from intensive care to patient units to emergency rooms, and you'll see the familiar banks of workstations where doctors and nurses busily access patient records and type in critical updates. For years, those stationary desktops have been the lifeblood of patient care. And while laptops have given caregivers some degree of mobility, "nobody wants to carry around a 4.5-pound laptop all day," one hospital CIO says. Doctors and nurses looking for mobile in healthcare to engage patients inside and outside the hospital may find a cure in small tablets, and they don't require a prescription.
Our cover story examines the infiltration of digital tablets and smartphones in healthcare as seen through the eyes of hospital CIOs. Some CIOs view mobile in healthcare as vastly "underdeveloped," "disjointed" and "clunky," with a "long way to go," not to mention the integration and security nightmares mobile devices can create for IT professionals. But CIOs also see the day when mobile devices will be a seamless and invisible part of healthcare and vastly improve patient care and engagement. That's already happening in some healthcare facilities where the distinction between tablets, laptops and even workstations is disappearing, as described in another feature. In addition to becoming fixtures in hospitals and outpatient clinics, tablets are finding a home in remote patient monitoring and achieving a level of sophistication that allows doctors and radiologists to view complex medical images anytime, anywhere.
This issue also covers several options for maintaining the security of mobile in healthcare, including identity protection, mobile app management, and advanced auditing and tracking techniques.Continue Reading
One of the most important parts of delivering applications to users is ensuring that the back-end IT infrastructure systems can support those apps in the short and long term. But there have been a lot of obstacles to building strong storage and networking back ends for VDI and mobile deployments. This month's cover story of Access magazine delves into the new IT infrastructure systems issues popping up around graphics support, secure data access and more.
To manage mobile apps, organizations need EMM, but the enterprise mobility management landscape is changing. One column in this issue explores whether EMM is a product or feature today, and another explores whether data and apps must live together. This month's Deep Dive examines the history of app stores and how the enterprise can benefit from this type of application deployment system. In the App Spotlight, get an overview of enterprise file sync-and-share service Box.Continue Reading
Evaluate EMM Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
There's more to enterprise mobile security than just mobile device management. Today, IT has more security tools at its disposal, from identity management to analytics. Continue Reading
Enterprise file sync-and-sharing tools help mobile users securely access, share and collaborate on office documents, spreadsheets and media files, such as photos and videos. Continue Reading
With mobility dominating the enterprise, many companies could benefit from implementing the right EMM tool. Get the answers to some frequently asked EMM questions. Continue Reading
Learn to apply best practices and optimize your operations.
With so many mobile security challenges around the bend, admins may worry they'll never see the finish line. IT can achieve security success by staying ahead of the curve. Continue Reading
VDI and enterprise mobility create a host of problems for IT to deal with, including delivering a quality user experience and incorporating monitoring tools. Continue Reading
Many companies lack the right policies or tools necessary to implement a successful enterprise mobility strategy. Find out what your mobile initiative might be missing. Continue Reading
Problem Solve EMM Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Citrix is a big player in the IT world, and it comes with a bit of its own language. Use this quiz to make sure the top Citrix terms don't trick you. Continue Reading
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading
While IoT is more pervasive than enterprise mobility, IoT adoption could be made smoother if we take lessons learned from EMM principles and functions. Continue Reading