Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively. Continue Reading
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively. Continue Reading
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use.Continue Reading
A developer's guide to mobile app personalization
User experience for a mobile app can improve significantly with the use of personalization. Learn about the benefits of app personalization and how to use it.Continue Reading
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined.Continue Reading
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization.Continue Reading
Prepare for the death of Intune's hybrid MDM
Microsoft is making some changes that could affect mobile device management with Intune. Here's how admins can stay prepared and reap the benefits of the stand-alone service.Continue Reading
-
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices.Continue Reading
How to sharpen a corporate mobile device strategy
Mobile devices aren't easy to manage. When organizations hand over a corporate device, IT should check a few things off of their to-do list, including security and cost factors.Continue Reading
Plan for the future of 5G in the enterprise
5G networks will bring speed and reduced latency to mobile business users that can take advantage of it. Get prepared for other changes that 5G will bring to the enterprise.Continue Reading
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps.Continue Reading
Low-code development platforms bring speed, friction
Low code is enabling organizations to push out mobile apps more quickly. But, for some organizations, low-code platforms introduce organizational challenges.Continue Reading
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company.Continue Reading
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps.Continue Reading
Keep track of evolving IAM products, technologies
IAM is at the heart of an organization's security strategy. To develop a strong IAM strategy, it's important to stay on top of the newest tools and trends.Continue Reading
What are the use cases for blockchain in mobile apps?
Blockchain can bring a variety of benefits to enterprise mobile apps. Explore some use cases before integrating this secure technology into mobile apps.Continue Reading
How can IT determine the optimal smartphone lifespan?
Smartphones don't last forever. Here's how organizations can determine their lifecycles to avoid security issues and keep smartphones functioning at peak performance.Continue Reading
Protect against mobile device security attacks
Mobile devices are often personal, so it's difficult to get end users to do the right thing. IT should take the reins to ensure that security isn't compromised.Continue Reading
How to avert mobile device security threats
From man-in-the-middle attacks to malware, mobile devices are susceptible to an array of threats. Here's how to prevent them from infiltrating the business.Continue Reading
How can organizations calculate the TCO of mobile devices?
There are a variety of factors to evaluate when determining the true cost of mobile devices in an organization. Unpack these factors to find the TCO.Continue Reading
Pros and cons of a low-code platform for mobile
Low-code platforms for mobile app development come with plenty of controversy. Discover why developers hate them and how organizations can use them to empower end users.Continue Reading
How middleware platforms can benefit mobile apps
Organizations that build mobile apps with a lot of integrations with back-end services should consider middleware. But first, be aware of these pros and cons.Continue Reading
Microsoft Surface Go holds promise for the enterprise
Microsoft has failed in the tablet market before, but the Surface Go could be a promising second chance for the company. Learn its features and pricing that set it apart.Continue Reading
Three ways to prioritize mobile app maintenance
Mobile apps shouldn't be left by the wayside once development is over. Follow these best practices to make sure a mobile app succeeds from start to finish.Continue Reading
Unpack the role of Google's Flutter app dev framework
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool.Continue Reading
Explore new options for Apple enterprise device management
Apple announced many of its updates at WWDC. Learn about some enterprise management features that have gone under the radar, including Apple Business Manager.Continue Reading
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years.Continue Reading
How IT can manage Office 365 for mobile devices
Office 365 is a cornerstone of office work, but how should IT manage the platform for mobile users? Find strategies to manage the software effectively in the enterprise.Continue Reading
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle.Continue Reading
Developers reap benefits of iOS app modules with Swift
Many developers recognize the benefits of app modularization. Historically, it's been difficult to begin the process, but now changes from Apple provide more opportunity.Continue Reading
What do the major mobile OSes offer for enterprise features?
Mobile devices are now commonplace in the enterprise. Discover which vendors are touting enterprise-ready features and which are reluctant to jump into the enterprise realm.Continue Reading
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud.Continue Reading
Develop an IAM strategy for the mobile enterprise
As the role of IAM evolves, it's important to be aware of current and future technologies. IT teams should review their needs, as well as the pros and cons of IAM, before deciding.Continue Reading
Four mobile app testing tools for enterprise developers
App testing ensures that users have a good experience with a mobile app and searches out bugs. Tools make it easy to integrate this process as part of mobile app development.Continue Reading
How can AI in mobile technology improve security?
AI can help IT better detect mobile security threats, so determine how to take advantage of this nascent technology. Prep for AI-based systems to enter the mobile security market.Continue Reading
Three questions to fuel a mobile app development project
It's not cheap to build a mobile app, so IT pros should do their research first. Here's how to determine the cost and discover which tools and trends your organization should adopt.Continue Reading
Cross-platform mobile app development is more viable than ever
Organizations today support such a variety of devices that they need a way to deliver apps more seamlessly. Cross-platform development is a new reality that can help.Continue Reading
Explore new features of Android Pie
Google released the public beta of Android's latest operating system, Android Pie, which includes new features for the enterprise. Discover what this latest version has to offer.Continue Reading
How IT can prevent mobile phishing attacks
Mobile devices enable users to make crucial security decisions. Here's how IT can obtain more control to prevent phishing attacks from occurring in the first place.Continue Reading
Review Office 365 mobile app updates
As Microsoft retires some of its mobile messaging-related services and improves others, the future of its mobile presence could be in one app -- the Outlook mobile app.Continue Reading
Explore options for automatic device enrollment
Enrolling mobile devices can be a hassle, especially for larger organizations. Explore these programs that can help automate the process and let IT focus on more important tasks.Continue Reading
Explore two major user authentication methods
Both biometric and multifactor authentication can provide high levels of security. Before choosing one -- or a combination of both -- learn the pros and cons of these technologies.Continue Reading
Be prepared to handle a mobile security breach
When it comes to cybersecurity, mobile security often falls by the wayside. Discover these techniques to prepare for a mobile security incident should it affect your organization.Continue Reading
IT must seek identity management tools with AI, biometrics
The current identity management market is evolving, but it isn't yet fully formed. Discover the technologies that will change ID management and how to use them.Continue Reading
Overview of Samsung Galaxy S9 specs, features for business
The Samsung Galaxy S9 features are pretty similar to that of the S8. But a dual rear camera and other interesting specs continue to make the Galaxy an option for any user.Continue Reading
Progressive web apps drive mobile development of the future
Progressive web apps offer many benefits, leading organizations to take advantage of this trend in mobile app dev. A lack of Apple support stands in the way for some, however.Continue Reading
Decide when to support the iPad Pro for work
Don't assume that the iPad Pro always works for the enterprise. IT pros should first evaluate when it's best to use an iPad rather than a PC or laptop.Continue Reading
Five rapid application development tools to consider for mobile
Rapid mobile application development vendors offer a variety of options, from low-code and no-code platforms to micro apps, workflow apps and more.Continue Reading
Make room for AI for mobile in the future
AI is one of the hottest new technologies in mobile. Evaluate the AI market and determine how your organization can take advantage of the latest advances in mobile tech.Continue Reading
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process.Continue Reading
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise.Continue Reading
A roundup of the leading EMM providers in today's market
Just as identifying the need for EMM is important, so is selecting the right vendor. Here's a rundown of leading EMM vendors and an in-depth peek into the products they offer.Continue Reading
Pros and cons of a multi-factor authentication mobile app
MFA can improve the security of an app by using a layered approach rather than one that relies on passwords alone. To know whether it's right for your app, weigh its pros and cons.Continue Reading
Compare these top EMM providers and their potential impact
With all the EMM products available, companies must know the major features that they offer and how the players stack up against each other.Continue Reading
Key factors to consider when making an EMM software purchase
Enterprises must look at many organizational factors when purchasing EMM software. Learn the most important decision points to choose the best EMM platform for any enterprise.Continue Reading
The big business functions of EMM software
Solid EMM software will manage and monitor a company's mobile device activity. Understand why organizations need EMM software and what constitutes a successful plan.Continue Reading
Learn what an EMM platform can achieve in the enterprise
Mobile device management is no longer enough to secure enterprise data. In the wake of BYOD and IoT, companies need EMM, but they must know its capabilities and challenges beforehand.Continue Reading
AI, security shape mobile app development trends in 2018
As demand for smarter mobile apps continues to rise, developers will embrace artificial intelligence, augmented reality and more robust security models to fill that gap in 2018.Continue Reading
What are the advantages of rapid application development?
RMAD requires less know-how, but still reduces the costs and risks typically involved in a traditional app build. Delve into the advantages of adopting RMAD products.Continue Reading
Explore the top vendors who offer enterprise mobile devices
Discover these top providers who sell both tablets and smartphones for business workers. Their offerings are diverse, and some are more enterprise-oriented than others.Continue Reading
Enterprise mobile devices and how the leaders stack up
When analyzing and comparing the seemingly endless options available for mobile devices, IT buyers should look at the device type, OS and security functions, among other criteria.Continue Reading
Quiz: Are you ready for AR and VR in the enterprise?
There is much more to AR and VR technology than meets the eye. Use this quiz to get a refreshing look on how the software and hardware are evolving in the enterprise.Continue Reading
The business case for mobile app development platforms
A solid MADP can address many enterprise mobile app needs if buyers can effectively make the case for them. Read the five major use cases for an app dev platform.Continue Reading
Is choosing non-native over native mobile apps risky for developers?
What's more risky: developing cross-platform or native mobile apps? One expert chooses sides in the native vs. non-native/cross-platform mobile apps debate.Continue Reading
Why smartphone technology won't ever replace PCs
Since the release of the iPhone in 2007, smartphone technology has become so advanced that the devices really are mini computers. But that doesn't mean they'll replace actual PCs. Innovations to ...Continue Reading
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM.Continue Reading
Design thinking ensures a better mobile user experience
The best IT shops know how to apply design thinking to the mobile app development process, keeping the mobile user experience at the forefront.Continue Reading
Eight factors when choosing mobile application development tools
When it comes to picking out a mobile app development tool it is important to keep lifecycle management, integration, internal expertise and more in mind.Continue Reading
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail.Continue Reading
Understanding HTML5 mobile application development
Developers can turn to HTML5 to simplify the mobile app development process. HTML5 mobile apps do come with some issues though, including performance that can't match native apps.Continue Reading
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools.Continue Reading
What are the best ways to use tablets for business?
As more enterprises begin to support tablets, many users find that the screen size and portability provides the right balance for common work-related tasks such as note taking.Continue Reading
The good, bad and ugly of Outlook apps for iOS and Android
Outlook mobile applications for iOS and Android are here, but is that a good thing? Take a look at why users will love them and why IT might hesitate to endorse them.Continue Reading
Weighing pros and cons of mobile application management
Rather than focusing on gaining access to users' devices, MAM puts the power squarely in IT's hands to protect mobile applications on any device.Continue Reading
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps.Continue Reading
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box.Continue Reading
Google Glass at Work could make some jobs easier
With Glass for Work, Google aims to overcome the challenges the "smart glasses" have faced in the consumer marketplace. The new focus on enterprise could help field workers, manufacturers and engineers get more done hands-free.Continue Reading
How does Box security help with auditing and compliance?
Box's security features help IT admins audit data access and limit the sharing of sensitive information stored in the cloud.Continue Reading
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what.Continue Reading
BlackBerry 10 open APIs extend MDM support without BES
BlackBerry's move to open its BlackBerry 10 OS APIs to other MDM tools is a welcome one for IT shops that don't want to stick with BES.Continue Reading
Five alternatives to Microsoft for mobile office applications
There are plenty of alternatives to Microsoft Office out there. Check out other mobile office apps that help you view and edit docs.Continue Reading
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them?Continue Reading
Microsoft moves deeper into cloud with Office Graph, OneDrive updates
Microsoft looks to the enterprise future with Yammer-inspired Office Graph for collaboration, standalone OneDrive for Business taking on Dropbox, Box.Continue Reading
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.Continue Reading
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases.Continue Reading
Cloud storage and file-sharing service features, pricing comparison
With all the cloud storage and file-sharing platforms available, it can be hard to choose. Use our chart to compare features, pricing and more.Continue Reading
SkyDrive Pro offers another corporate cloud storage service option
Cloud-based storage is in high demand, but will Windows 8.1 with SkyDrive meet the need for an enterprise-grade service?Continue Reading
Everything you need to know about developing mobile apps
Developing mobile apps for your users can help them be more productive, but before you start building apps, learn about the different kinds.Continue Reading
BMC's Partnerpedia acquisition to yield unified enterprise app store
BMC, RES Software and other vendors offer enterprise app stores akin to Apple's Mac App Store to deliver apps and services to corporate employees . Here's how.Continue Reading
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies.Continue Reading
Mobile application delivery: How to do it and what to beware of
Mobile application delivery is a tough nut to crack. Every delivery option has drawbacks, such as cost, connectivity and user experience.Continue Reading
app store (application store)
An app store (application store) is an online portal through which software programs are made available for procurement and download.Continue Reading
Surface RT review: The good, the bad and the ugly
The Surface RT tablet comes with Office and has good battery life, but it has some drawbacks, too. This Surface RT review explains the pros and cons.Continue Reading
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.Continue Reading
Comparing mobile operating systems and application environments
Each mobile operating system has a different application environment, but that could be more of an advantage for businesses than a detriment.Continue Reading
Top five mobile application vulnerabilities
Devices are often blamed for insecurities, but mobile app vulnerabilities are insidious. Make sure employees use common sense when they download apps.Continue Reading
ITSM tools enter the consumerization era
BMC's MyIT app aims to bridge the gap between traditional ITSM tools and today's empowered, mobile end users.Continue Reading