Features
Features
-
How to create a mobile device security policy, with template
A well-defined mobile device security policy should educate employees on the proper use of BYODs and set clear standards for end users and IT administrators alike. Continue Reading
-
Simplify mobile app development for the enterprise
Without the right resources, mobile app development can be challenging. Find out how to start the process and the best tools to streamline the app dev journey. Continue Reading
-
The ultimate guide to mobile device security in the workplace
Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT. Continue Reading
-
What BYOD trends will take hold in the business world?
As employees and organizations come to expect greater mobility, BYOD is an important consideration in the successful planning and execution of the remote and hybrid workplace. Continue Reading
-
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these seven best practices to manage mobile device and data security. Continue Reading
-
Finding the best mobile hotspot option for remote work
Organizations that allow the use of mobile hotspots for remote work must know how personal hotspots and dedicated hotspot devices differ. Compare these hotspot options. Continue Reading
-
Comparing iPhone vs. Android for business
Organizations deploying or managing smartphones for corporate use should know how iPhone and Android compare in an enterprise setting. Factors such as UX are key differences. Continue Reading
-
7 key benefits of enacting a BYOD policy
While some benefits of a BYOD program are obvious, such as allowing users to only carry one endpoint, other benefits are worth exploring, such as lowering corporate emissions. Continue Reading
-
The story of mobile phishing through statistics
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy. Continue Reading
-
Time is money: Microsoft's HoloLens 2 saves both
The Microsoft HoloLens 2 headset has yet to reach wide adoption among enterprises. But organizations that have embraced it have found that the AR product saves time and cuts costs. Continue Reading
-
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also overlap. Knowing their differences is important. Continue Reading
-
Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategy
BYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading
-
AR use cases gain ground due to COVID-19, maturing tech
AR technology is growing beyond technical instruction, helped by work-from-home mandates and maturing technology. Continue Reading
-
Samsung Quick Share will support Windows 10 use
Samsung's Quick Share file service is set to gain Windows 10 support, and it may help Samsung device users quickly transfer files for common workflows. Continue Reading
-
Election apps, advertising target mobile phone users
As political campaigns ramp up their use of mobile technology to do battle this election season, apps have arisen to inform citizens and encourage them to vote. Continue Reading
-
Dell XPS 13 (2020) review: The best Windows 10 laptop
The Dell XPS 13 is more expensive than other Windows 10 laptops, but is it worth it? Its impeccable design, stunning display and impressive spec sheet suggest yes, at least on paper. Continue Reading
-
Augmented reality technology matures but deployment hurdles remain
For IT admins who are just getting the hang of managing smartphones and tablets in the enterprise, AR may not be a welcome tech. Continue Reading
-
Rugged devices market grows as hardware gets more portable
A warehouse employee needs logistics information while wearing gloves. A delivery worker needs their device in the truck and at the door. Here's why rugged devices are on the rise. Continue Reading
-
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
-
Acer Spin 5, TravelMate P6 preview: Great specs, good price
At CES 2020, the Acer Spin 5 and Acer TravelMate P6 and P2 series headlined the vendor's appearance. Acer focused its upgrades on durability, productivity and affordability. Continue Reading
-
Dell Latitude 9510 and XPS 13 preview: Best in business
The Dell Latitude 9510 and XPS 13 unveiled at CES 2020 redefine the business laptop, touting features like 5G, AI, impossibly long battery life, maxed out displays and more. Continue Reading
-
Samsung Galaxy Chromebook, Galaxy Book Flex Alpha hands-on
The Samsung Galaxy Chromebook revealed at CES promises more power and performance than competitors, while the Galaxy Book Flex Alpha is an affordable option to its predecessor. Continue Reading
-
HP Spectre X360 15, Elite Dragonfly hands-on preview
Upgrades to the HP Spectre X360 15 and HP Elite Dragonfly were unveiled at CES 2020, catering to the needs of business users -- but at a cost. Continue Reading
-
It's a foldable PC: Lenovo ThinkPad X1 Fold hands-on preview
The much-awaited Lenovo ThinkPad X1 Fold headlined the vendor's CES 2020 appearance, accompanied by upgrades to two of its flagship laptops -- the ThinkPad X1 Carbon and Yoga. Continue Reading
-
Learn about Microsoft's changes to the Office mobile app
In 2019, Microsoft announced the Office mobile app as an entry point for its productivity suite and developed Office Intelligent Services features that can improve productivity. Continue Reading
-
New Outlook features appeal to users on the go
At Ignite, Microsoft announced some improvements to its Office app and Outlook for iOS and Android. Learn about how it benefits both IT and end users. Continue Reading
-
Smartphone market trends elicit longer refresh cycles
Organization must follow the smartphone market trends to inform their purchase decisions. Mobile admins should tailor purchase choices to fit each desired use case. Continue Reading
-
8 JNUC 2019 sessions that will help iOS admins
At JNUC 2019, Apple admins gather to discuss their management practices, issues and success stories. Mobile admins who manage iPhones should look into these sessions. Continue Reading
-
8 vendors who offer enterprise mobile devices and tablets in 2019
Discover eight leading providers who sell both tablets and smartphones for business workers. Their offerings are diverse, and some are more enterprise-oriented than others. Continue Reading
-
How to choose the right mobile device for business
Explore three criteria to look at when evaluating which mobile device is best suited for your organization. These include ease of use, as well as security and tablets vs. smartphones. Continue Reading
-
Advantages and disadvantages of mobile devices in business
Mobile devices have become a steady presence in today's workplace. Learn about mobile devices in businesses and how they can help employees work more efficiently. Continue Reading
-
Latest iOS vulnerability puts mobile security in the spotlight
In this Q&A, sort through all the confusion regarding Google Project Zero's report on a major iOS vulnerability and determine how it should change your security policies. Continue Reading
-
New Android Q features could relieve IT headaches
IT should get to know the latest Android Q features set to release with the new OS, but they also must learn about key features that Google will deprecate such as Device Admin. Continue Reading
-
Choose the right UEM platform with this in-depth roundup
UEM tools are essential to oversee the many endpoints that reside in companies today. Read this comprehensive roundup to learn more about the leading products on the market. Continue Reading
-
Clear up the confusion about end-user computing
Today's end-user computing industry is the culmination of a decade of changes in mobility, desktops, virtualization and more. Dive in to what really qualifies as EUC. Continue Reading
-
3 Intune app management practices that IT pros should know
Intune admins should learn the basics of Intune app management for deploying, wrapping and securing applications. Find out why each step is crucial and how IT can accomplish them. Continue Reading
-
Top 3 emerging mobile app development trends for 2019
These three emerging mobile app development strategies could change the way apps are developed in the future. Discover which of these methods is right for your organization. Continue Reading
-
Make the case for UEM tools with these compelling uses
Unified endpoint management provides companies with a single platform to oversee multiple devices. Learn more about the cost, productivity and overall business benefits. Continue Reading
-
How Apple iOS 13 device management features benefit IT
Organizations with Apple mobile devices should prepare for the new iOS 13 device management features, such as user enrollment and Managed Apple IDs for Business. Continue Reading
-
Discover details on unified endpoint management
With the prevalence of mobile devices in the enterprise, companies need solid technology to manage them. UEM tools consolidate all endpoints together to ensure they are secure. Continue Reading
-
Identity management strategy starts with people, not technology
Organizations have the tough job of creating an overarching view of identity inside and out of the company. One thing they should remember? Focus on people rather than technology. Continue Reading
-
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
-
Identity access management at a crossroads
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems. Continue Reading
-
Hybrid identity management could be a method to the madness
IT departments planning to undergo a hybrid cloud migration need to think through how they're going to provide flexible and secure identity and access management to employees. Continue Reading
-
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
-
How the Huawei ban will affect enterprise mobility
The U.S.'s ban of business purchases of foreign telecommunications products, largely aimed at Chinese vendor Huawei, has major implications for mobile IT admins around the world. Continue Reading
-
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
-
As enterprise device choice grows, so should a CYOD strategy
It's been 11 years since the iPhone came to market, but IT admins are still struggling with CYOD strategies. One reason? Choose your own device is now choose your own devices. Continue Reading
-
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans. Continue Reading
-
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
-
Mobile deployments get flexible with Android, device as a service
Mobile device admins have plenty of choices for their mobile deployments, including OSes and device ownership plans. Get the lay of the land with this Q&A. Continue Reading
-
4 mobile security best practices for enterprise IT
Organizations should look to update their mobile security best practices due to COVID-19. IT must incorporate BYOD access to corporate data and other new mobile capabilities. Continue Reading
-
The end of hybrid Intune MDM and what IT needs to know
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions. Continue Reading
-
Watch out for these mobile technology trends in 2019
As 2018 ends, IT should be on the lookout for the newest trends in enterprise mobile technology. Here's what IT pros should have on their radar for 2019. Continue Reading
-
Cross-platform frameworks offer one-code path to mobile dev
Cross-platform app development frameworks enable developers to create native apps for iOS and Android. At a Progress conference, developers discuss different approaches. Continue Reading
-
How to sharpen a corporate mobile device strategy
Mobile devices aren't easy to manage. When organizations hand over a corporate device, IT should check a few things off of their to-do list, including security and cost factors. Continue Reading
-
Low-code development platforms bring speed, friction
Low code is enabling organizations to push out mobile apps more quickly. But, for some organizations, low-code platforms introduce organizational challenges. Continue Reading
-
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company. Continue Reading
-
Keep track of evolving IAM products, technologies
IAM is at the heart of an organization's security strategy. To develop a strong IAM strategy, it's important to stay on top of the newest tools and trends. Continue Reading
-
Fleetsmith expands options for Apple device management
Mobile device management can be a challenge for IT admins. Discover one vendor's approach and how security can make or break an organization's MDM strategy. Continue Reading
-
Box mobile app faces security concerns, feature gaps
Box has made strides with its mobile apps, but organizations still have concerns about file sharing on mobile and look for a few feature gaps to be filled in. Continue Reading
-
Explore new iOS security features
Explore the latest features from Apple and the new iOS 12, an operating system that will give IT more control over iOS device management and security in the enterprise. Continue Reading
-
How to create an inclusive endpoint management strategy
Smartwatches, IoT devices and sensors -- oh my! Endpoint management can get confusing quickly, but you can figure it out by answering these questions. Continue Reading
-
Understand the tools for managing Android devices in the enterprise
Over the past year, Google has released new capabilities and features to manage Android enterprise devices. IT should be aware of these recent updates for Android device management. Continue Reading
-
Mobile apps for field service adapt to meet deskless needs
Old habits die hard, but mobile field service apps have staying power as they secure and ease communication and reporting across various industries and business sizes. Continue Reading
-
How to implement tablets for enterprise use
To integrate tablets into the enterprise, IT needs to know more than just which tablet is the best fit. Discover the tools that can help IT enroll and maintain the new devices. Continue Reading
-
Three ways to prioritize mobile app maintenance
Mobile apps shouldn't be left by the wayside once development is over. Follow these best practices to make sure a mobile app succeeds from start to finish. Continue Reading
-
Plan your mobile cross-platform app development process
The decision to create a cross-platform mobile app is only the first step for IT. Here, explore the options of tools to use and how to test the app. Continue Reading
-
How IT can manage Office 365 for mobile devices
Office 365 is a cornerstone of office work, but how should IT manage the platform for mobile users? Find strategies to manage the software effectively in the enterprise. Continue Reading
-
How to manage security threats to mobile devices
As mobile device security threats increase, IT administrators should know what they are up against and develop strategies to secure mobile devices from cyber attacks. Continue Reading
-
Four mobile app testing tools for enterprise developers
App testing ensures that users have a good experience with a mobile app and searches out bugs. Tools make it easy to integrate this process as part of mobile app development. Continue Reading
-
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt. Continue Reading
-
Explore two major user authentication methods
Both biometric and multifactor authentication can provide high levels of security. Before choosing one -- or a combination of both -- learn the pros and cons of these technologies. Continue Reading
-
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well. Continue Reading
-
Overview of Samsung Galaxy S9 specs, features for business
The Samsung Galaxy S9 features are pretty similar to that of the S8. But a dual rear camera and other interesting specs continue to make the Galaxy an option for any user. Continue Reading
-
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started. Continue Reading
-
Five rapid application development tools to consider for mobile
Rapid mobile application development vendors offer a variety of options, from low-code and no-code platforms to micro apps, workflow apps and more. Continue Reading
-
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways. Continue Reading
-
A roundup of the leading EMM providers in today's market
Just as identifying the need for EMM is important, so is selecting the right vendor. Here's a rundown of leading EMM vendors and an in-depth peek into the products they offer. Continue Reading
-
Compare the main mobile app development languages
Developing an app is all about visualizing what the users need and what they'll see in the UI. Get visual with this infographic about the top mobile app dev languages before you build. Continue Reading
-
A handy mobile app testing checklist for developers
Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper tools to build and deliver high-quality mobile apps. Continue Reading
-
Compare these top EMM providers and their potential impact
With all the EMM products available, companies must know the major features that they offer and how the players stack up against each other. Continue Reading
-
Key factors to consider when making an EMM software purchase
Enterprises must look at many organizational factors when purchasing EMM software. Learn the most important decision points to choose the best EMM platform for any enterprise. Continue Reading
-
The big business functions of EMM software
Solid EMM software will manage and monitor a company's mobile device activity. Understand why organizations need EMM software and what constitutes a successful plan. Continue Reading
-
Learn what an EMM platform can achieve in the enterprise
Mobile device management is no longer enough to secure enterprise data. In the wake of BYOD and IoT, companies need EMM, but they must know its capabilities and challenges beforehand. Continue Reading
-
Explore the top vendors who offer enterprise mobile devices
Discover these top providers who sell both tablets and smartphones for business workers. Their offerings are diverse, and some are more enterprise-oriented than others. Continue Reading
-
Enterprise mobile devices and how the leaders stack up
When analyzing and comparing the seemingly endless options available for mobile devices, IT buyers should look at the device type, OS and security functions, among other criteria. Continue Reading
-
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today. Continue Reading
-
The business case for mobile app development platforms
A solid MADP can address many enterprise mobile app needs if buyers can effectively make the case for them. Read the five major use cases for an app dev platform. Continue Reading
-
Understanding HTML5 mobile application development
Developers can turn to HTML5 to simplify the mobile app development process. HTML5 mobile apps do come with some issues though, including performance that can't match native apps. Continue Reading
-
The good, bad and ugly of Outlook apps for iOS and Android
Outlook mobile applications for iOS and Android are here, but is that a good thing? Take a look at why users will love them and why IT might hesitate to endorse them. Continue Reading
-
Why you need mobile infrastructure
IT shops need to invest in modern mobile infrastructure to meet the growing demands of mobility in the enterprise. Continue Reading
-
Create apps that focus on end-user needs first
Many companies approach mobile app development backward and don't even realize it. Prioritizing user needs over business needs will breed better results. Continue Reading
-
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them? Continue Reading
-
Where wearable devices could fit in the business world
Whether wearable devices will have a place in the enterprise remains to be seen, but the devices do have some interesting use cases for businesses. Continue Reading
-
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds. Continue Reading
-
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience. Continue Reading
-
Cius vs. iPad: Can Cisco take on Apple?
The battle for the enterprise tablet may boil down to Cisco vs. Apple and Cius vs. iPad. However, Fast Packet blogger, Greg Ferro wonders if Cisco really has the engineering and apps to win. Continue Reading
-
Detecting rogue mobile devices on your network
Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to detect and restrict mobile access, ... Continue Reading
-
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy. Continue Reading