Enterprise mobility strategy and policy
Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.. See complete definition.
Top Stories
-
Tip
03 Mar 2022
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading
-
Feature
24 May 2021
The future of BYOD: Trends and predictions
As employees and corporations come to expect greater flexibility and mobility, BYODs are an important element in the successful planning and execution of the hybrid workplace. Continue Reading
-
Feature
07 May 2021
Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategy
BYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading
-
Tip
16 Apr 2021
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well. Continue Reading
-
Tip
01 Apr 2021
5 endpoint security best practices to keep company data safe
With an expanding company perimeter, it's time to implement these endpoint security best practices, from asset discovery to device profiling. Continue Reading
-
Infographic
13 May 2020
The coronavirus effect on enterprise technology practices
Effects of COVID-19 on enterprise IT go well beyond enabling remote workforces. Coronavirus is also changing approaches to IT staffing, projects/initiatives and budgets/spending. Continue Reading
-
Tip
08 Apr 2020
Create a mobile BYOD policy for the coronavirus pandemic
The COVID-19 pandemic is forcing organizations to support remote work whenever possible. Organization can follow a few key steps to enable productive remote work on mobile devices. Continue Reading
-
Tip
30 Mar 2020
7 enterprise policies that enhance mobile user experience
Mobile admins must prioritize the mobile user experience they provide on their mobile fleet by deploying policies such as IT approving app permissions and single sign-on. Continue Reading
-
Tip
20 Mar 2020
5 strategic steps to blunt mobile device security threats
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it. Continue Reading
-
Feature
04 Mar 2020
3 OTA architectures for IoT devices
Organizations must pick the right OTA update architecture to ensure IoT devices receive the latest changes more efficiently and with less of an effect on your organization. Continue Reading
-
News
02 Mar 2020
New coronavirus wreaking havoc on tech conference calendar
As the coronavirus continues to spread, the organizers of some technology conferences have decided to alter or cancel their events for the safety of attendees. Continue Reading
-
Tip
26 Feb 2020
6 common challenges to IoT OTA updates
Keeping technology updated will become even more critical with IoT devices. Over-the-air updates can ease the process if administrators know how to address the obstacles. Continue Reading
-
Feature
22 Jan 2020
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
-
Tip
03 Jan 2020
4 factors that should shape a BYOD mobile policy
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
-
Tip
11 Nov 2019
Deploy kiosk devices with the Managed Home Screen Android app
The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best Managed Home Screen Android management options. Continue Reading
-
Feature
04 Nov 2019
8 JNUC 2019 sessions that will help iOS admins
At JNUC 2019, Apple admins gather to discuss their management practices, issues and success stories. Mobile admins who manage iPhones should look into these sessions. Continue Reading
-
Tip
31 Oct 2019
Develop a strong smartphone policy for the enterprise
Organizations with managed mobile users need to develop a smartphone policy, on everything from data use to app installation, to ensure security and smooth business processes. Continue Reading
-
Opinion
07 Oct 2019
NIST offers mobility best practices guide based on COPE deployments
Mobility isn’t a new concept, but it can sometimes be difficult to know where to start if you don’t have a framework in place, which is where NIST guidelines come in. Continue Reading
-
Feature
30 Aug 2019
Choose the right UEM platform with this in-depth roundup
UEM tools are essential to oversee the many endpoints that reside in companies today. Read this comprehensive roundup to learn more about the leading products on the market. Continue Reading
-
Feature
27 Aug 2019
Compare UEM software and must-have features
UEM tools are essential to manage and secure the varying endpoints within an IT environment. Explore the major features and functions to consider and the vendors that provide them. Continue Reading
-
Guide
14 Aug 2019
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market. Continue Reading
-
News
13 Aug 2019
Samsung-Microsoft partnership will benefit end users
The capabilities that come with connecting your smartphone to your PC can have substantial benefits for end users, according to analysts, as Samsung and Microsoft partner. Continue Reading
-
Opinion
01 Aug 2019
Why EMM is the key to any enterprise mobility strategy
Now is the time to start incorporating EMM into enterprise mobility strategies. Here's why EMM is important and how organizations can take advantage of its benefits. Continue Reading
-
Feature
31 Jul 2019
Make the case for UEM tools with these compelling uses
Unified endpoint management provides companies with a single platform to oversee multiple devices. Learn more about the cost, productivity and overall business benefits. Continue Reading
-
Opinion
29 Jul 2019
Mobility management systems evolve from MDM to EMM to UEM
Driven by the cloud, evolving mobile devices, unification and the need for better security, companies are vacating the premises and embracing unified endpoint management. Continue Reading
-
Tip
19 Jul 2019
Apple and Google simplify BYOD management with new OSes
IT must weigh user privacy and endpoint security when it shapes its BYOD policies. Luckily, new features in iOS 13 and Android Q make this balance easier for IT to strike. Continue Reading
-
Feature
18 Jul 2019
Discover details on unified endpoint management
With the prevalence of mobile devices in the enterprise, companies need solid technology to manage them. UEM tools consolidate all endpoints together to ensure they are secure. Continue Reading
-
Feature
10 Jul 2019
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
-
Feature
28 Jun 2019
Identity access management at a crossroads
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems. Continue Reading
-
Feature
28 Jun 2019
Hybrid identity management could be a method to the madness
IT departments planning to undergo a hybrid cloud migration need to think through how they're going to provide flexible and secure identity and access management to employees. Continue Reading
-
Feature
18 Jun 2019
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
-
News
14 May 2019
Dell Latitude PCs get redesign with IT, mobile workforce in mind
Dell's Latitude PCs get a new look and new features that could make it easier for IT admins to support a mobile workforce, according to analysts. Continue Reading
-
Tip
10 May 2019
How AI chatbots for enterprise use can help mobile admins
Mobile chatbots that include AI technologies can help organizations simplify user and IT workflows. Learn exactly how these chatbots can fit within a mobility management strategy. Continue Reading
-
Feature
30 Apr 2019
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
-
Quiz
15 Apr 2019
Mobile authentication best practices quiz for IT pros
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly. Continue Reading
-
Tip
15 Apr 2019
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are. Continue Reading
-
Feature
11 Apr 2019
As enterprise device choice grows, so should a CYOD strategy
It's been 11 years since the iPhone came to market, but IT admins are still struggling with CYOD strategies. One reason? Choose your own device is now choose your own devices. Continue Reading
-
Feature
05 Apr 2019
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans. Continue Reading
-
Feature
04 Apr 2019
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
-
Tip
28 Mar 2019
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
-
Tip
25 Mar 2019
Unified endpoint management tools enrich the user experience
A well-conceived and well-executed UEM strategy that prioritizes UX can improve cross-platform capabilities, system access and ultimately worker productivity. Continue Reading
-
Answer
22 Mar 2019
How can IT consolidate UEM and IAM tools?
As UEM tools begin to add IAM features and vice versa, IT should consider ways to bridge the gap. Determine how to combine the capabilities of each tool. Continue Reading
-
Feature
20 Feb 2019
4 mobile security best practices for enterprise IT
Organizations should look to update their mobile security best practices due to COVID-19. IT must incorporate BYOD access to corporate data and other new mobile capabilities. Continue Reading
-
Tip
15 Feb 2019
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios. Continue Reading
-
Answer
04 Feb 2019
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
-
Feature
19 Dec 2018
Watch out for these mobile technology trends in 2019
As 2018 ends, IT should be on the lookout for the newest trends in enterprise mobile technology. Here's what IT pros should have on their radar for 2019. Continue Reading
-
Opinion
27 Nov 2018
What's driving the next-generation mobile user experience
Mobile users expect more from their employers these days. Thankfully, new technologies are making it possible for organizations to ride the latest evolution in mobile experiences. Continue Reading
- 27 Nov 2018
-
Answer
21 Nov 2018
What problems occur with Intune app protection for Outlook?
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction. Continue Reading
-
Tip
15 Nov 2018
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined. Continue Reading
-
Answer
19 Oct 2018
Removable storage devices: Why are companies banning them?
IBM banned removable storage devices to encourage employees to use the company's internal file-sharing system. Learn how a ban like this can improve enterprise security. Continue Reading
-
Feature
16 Oct 2018
How to sharpen a corporate mobile device strategy
Mobile devices aren't easy to manage. When organizations hand over a corporate device, IT should check a few things off of their to-do list, including security and cost factors. Continue Reading
-
Tip
05 Oct 2018
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
-
Feature
17 Sep 2018
Keep track of evolving IAM products, technologies
IAM is at the heart of an organization's security strategy. To develop a strong IAM strategy, it's important to stay on top of the newest tools and trends. Continue Reading
-
Answer
06 Sep 2018
How can IT determine the optimal smartphone lifespan?
Smartphones don't last forever. Here's how organizations can determine their lifecycles to avoid security issues and keep smartphones functioning at peak performance. Continue Reading
-
Answer
17 Aug 2018
How can organizations calculate the TCO of mobile devices?
There are a variety of factors to evaluate when determining the true cost of mobile devices in an organization. Unpack these factors to find the TCO. Continue Reading
-
Tip
09 Aug 2018
How desktop and app virtualization vendors handle mobile devices
If IT pros want to provide their users with access to virtual desktops and apps on mobile devices, they should know which vendors offer which virtualization services. Continue Reading
-
Opinion
09 Aug 2018
How virtual assistant technology will affect the enterprise
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future. Continue Reading
-
Opinion
02 Aug 2018
IBM MaaS360 built a voice-based AI assistant into their email app
With the MaaS360 Assistant, potentially increase employee mobile productivity. Continue Reading
-
Opinion
31 Jul 2018
How IoT edge devices fit into unified endpoint management
Unified endpoint management strategies are evolving to include not just mobile devices, but sensor-connected IoT devices, too. Intelligent edge management can help. Continue Reading
-
Opinion
11 Jul 2018
Ruggedized devices face a mobile-fueled transition
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years. Continue Reading
-
Feature
06 Jul 2018
How IT can manage Office 365 for mobile devices
Office 365 is a cornerstone of office work, but how should IT manage the platform for mobile users? Find strategies to manage the software effectively in the enterprise. Continue Reading
-
Tip
02 Jul 2018
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle. Continue Reading
-
Opinion
29 May 2018
Mobility strategies shift toward UEM, IAM in 2018
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile. Continue Reading
- 21 May 2018
-
Tip
17 May 2018
Explore options for automatic device enrollment
Enrolling mobile devices can be a hassle, especially for larger organizations. Explore these programs that can help automate the process and let IT focus on more important tasks. Continue Reading
-
Tip
25 Apr 2018
Manage Windows 10 desktops, mobile devices with EMM software
Windows 10 supports crucial functions that enable enterprise mobility management. IT must follow a few important steps to prepare desktops for management through EMM. Continue Reading
-
Quiz
24 Apr 2018
How well do you know EMM platforms?
Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between them? Test your knowledge with this quiz. Continue Reading
-
Feature
19 Apr 2018
Pros and cons of AI for mobile IT
Mobile IT admins should be prepared to take advantage of artificial intelligence technologies, but it's important to be aware of the risks and challenges involved, as well. Continue Reading
-
Answer
19 Apr 2018
How should IT handle app onboarding for employees?
When it comes to onboarding a mobile app for internal use, IT should make the process as easy as possible. Here are several strategies to help. Continue Reading
-
Opinion
19 Mar 2018
Decide when to support the iPad Pro for work
Don't assume that the iPad Pro always works for the enterprise. IT pros should first evaluate when it's best to use an iPad rather than a PC or laptop. Continue Reading
-
Feature
06 Mar 2018
Mobile is at the forefront of digital transformation trends
As 'digital transformation' dominates discussion, understand why it's important to keep mobile at the forefront of the initiative -- and what you can do to get started. Continue Reading
-
Tip
23 Feb 2018
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it. Continue Reading
-
Opinion
19 Feb 2018
Make room for AI for mobile in the future
AI is one of the hottest new technologies in mobile. Evaluate the AI market and determine how your organization can take advantage of the latest advances in mobile tech. Continue Reading
-
Tip
05 Feb 2018
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise. Continue Reading
-
Tip
31 Mar 2017
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
News
21 Mar 2017
Samsung Knox gives IT control over Android OS updates
Knox's E-FOTA feature lets IT test Android OS updates before users install them on their Samsung devices, preventing apps from breaking. Continue Reading
-
Tip
11 Oct 2016
VMware AirWatch policy and configuration tips you might not know about
There are some under-the-radar features that IT pros can take advantage of when it comes to VMware AirWatch configuration and policy settings. Automation can also be beneficial. Continue Reading
-
Tip
23 Oct 2015
How to manage BYOD security policies and stay compliant
The best BYOD security policies help enterprises stay compliant with security and privacy regulations. Here's what BYOD policies should include and how best to manage them. Continue Reading
-
Tip
30 Apr 2015
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Tip
12 Aug 2014
Google Glass at Work could make some jobs easier
With Glass for Work, Google aims to overcome the challenges the "smart glasses" have faced in the consumer marketplace. The new focus on enterprise could help field workers, manufacturers and engineers get more done hands-free. Continue Reading
-
Tip
19 May 2014
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading
-
Tip
07 Jun 2012
Android versus iOS security: Features, policies and controls
There’s not a clear winner when it comes to Android versus iOS security, but with iOS’ app security in one corner and Android’s encryption in the other, it makes for a good fight. Continue Reading
-
Tutorial
15 Jul 2011
Bringing BYOD to your enterprise
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed. Continue Reading
-
Tip
14 Jul 2011
Meeting technical requirements for mobile health care deployments
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
-
Tip
27 Jun 2011
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
-
Tip
12 Apr 2011
Does a mobile VDI platform make sense for your users?
Mobile VDI isn't always a good fit. Ask these five questions to determine whether a mobile VDI platform makes sense for your users. Continue Reading
-
Feature
22 Mar 2011
Cius vs. iPad: Can Cisco take on Apple?
The battle for the enterprise tablet may boil down to Cisco vs. Apple and Cius vs. iPad. However, Fast Packet blogger, Greg Ferro wonders if Cisco really has the engineering and apps to win. Continue Reading
-
News
21 Feb 2011
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down. Continue Reading
-
Tip
18 Jan 2010
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide the customer toward the right mobile operating system. Continue Reading
-
Feature
16 Jun 2008
Detecting rogue mobile devices on your network
Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to detect and restrict mobile access, complemented by IPS to spot anything that slips through the cracks. Such techniques can be effective, but today's mobile devices can present new challenges that deserve further attention. Lisa Phifer discusses the challenges being introduced by today's increasingly diverse mobile devices and discusses some emerging techniques to deal with them. Continue Reading
-
Feature
28 May 2008
Mobile security policies
Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy. Continue Reading
-
Report
30 Nov 2006
Mobile operating systems: Which mobile device platform fits your strategy?
Mobile operating systems (OS) and mobile device platforms can be confusing for mobile managers. These unbiased stories aim to help you choose the platform that's right for your company. Continue Reading