Mobile Security Old
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.. See complete definition.
-
Answer
15 May 2019
Why do mobile admins need Android Enterprise management?
Google is pushing Android Enterprise management and deprecating Device Admin features. Find out why IT should fall in line and migrate to Android Enterprise. Continue Reading
-
News
14 May 2019
Lenovo launches AR for the workplace with ThinkReality
Lenovo announced ThinkReality A6, its new head-mounted AR product. It was designed specifically with the workforce in mind to increase time and cost efficiency. Continue Reading
-
Tip
14 May 2019
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management. Continue Reading
-
News
14 May 2019
Dell Latitude PCs get redesign with IT, mobile workforce in mind
Dell's Latitude PCs get a new look and new features that could make it easier for IT admins to support a mobile workforce, according to analysts. Continue Reading
-
News
13 May 2019
New MobileIron zero-trust security platform launches
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords. Continue Reading
-
Tip
10 May 2019
How AI chatbots for enterprise use can help mobile admins
Mobile chatbots that include AI technologies can help organizations simplify user and IT workflows. Learn exactly how these chatbots can fit within a mobility management strategy. Continue Reading
-
News
08 May 2019
The new Google Pixel 3a Android smartphone starts at $399
Google launched the more affordable Pixel 3a and 3a XL phones for $399 and $479, with the aim of providing smartphones similar in quality to the Pixels for less money. Continue Reading
-
News
03 May 2019
Chrome OS 74 brings support for AI search, annotations and more
Google's Chrome OS 74 release includes numerous organizational, accessibility and security upgrades, as well as Android and Linux support, to improve usability. Continue Reading
-
Feature
30 Apr 2019
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
-
Opinion
30 Apr 2019
Blue Cedar launches BlackBerry Accelerator for automatic MAM SDK integration
Mobile app management SDKs and app wrapping are a large total addressable market in the enterprise. The BlackBerry Accelerator joins other tech for automatic SDK integration. Continue Reading
-
Answer
26 Apr 2019
Which Android Device Admin APIs will Google deprecate?
With the release of Android Q, Google will discontinue several Android Device Admin APIs. Learn which Android management APIs will be deprecated and which will remain. Continue Reading
-
Guide
26 Apr 2019
Best smartphone for business use relies on many key factors
Operating systems and security protection are among the key considerations when companies select smartphones for business use. Learn more about device options and decision points. Continue Reading
-
Tip
24 Apr 2019
Android or iOS for business users: Pros and cons for each OS
When IT considers Android or iOS for business use, it should factor in the customization and variety that Android allows, compared to the consistency that iOS offers. Continue Reading
-
News
22 Apr 2019
BlackBerry Messenger to shut down, paid version available
The original encrypted BBM app will no longer be available as of May 31 as BlackBerry and Emtek go their separate ways, though the subscription enterprise version is now available. Continue Reading
-
Answer
16 Apr 2019
Phablet vs. tablet: How can IT determine which option is best?
For mobile endpoints, IT must determine the best choice of phablet vs. tablet. IT should examine the strengths and weaknesses of each device type before making a choice. Continue Reading
-
Opinion
16 Apr 2019
Conditional access (zero trust) is the most important EUC movement since mobile and cloud
How do we put together the “any-any-any” message we’ve been hearing for years? With access policies that take the device, user, app, risks, and other factors into account. Continue Reading
-
Quiz
15 Apr 2019
Mobile authentication best practices quiz for IT pros
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly. Continue Reading
-
Tip
15 Apr 2019
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are. Continue Reading
-
News
12 Apr 2019
New AMD Ryzen PRO, Athlon PRO processors added to AMD lineup
AMD claims the second-generation AMD Ryzen PRO 3000 series and Athlon PRO 300 series will outperform competition in graphics performance, battery life and security in business-grade laptops. Continue Reading
-
Feature
11 Apr 2019
As enterprise device choice grows, so should a CYOD strategy
It's been 11 years since the iPhone came to market, but IT admins are still struggling with CYOD strategies. One reason? Choose your own device is now choose your own devices. Continue Reading
-
Feature
05 Apr 2019
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans. Continue Reading
-
Tip
05 Apr 2019
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability. Continue Reading
-
Feature
04 Apr 2019
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
-
Tip
29 Mar 2019
5 tips for iOS and Android kiosk device management
IT pros can deploy configurations for kiosk devices with mobile management tools, such as Microsoft Intune. Consider these tips to ensure kiosk devices function as intended. Continue Reading
-
Tip
28 Mar 2019
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
-
Opinion
26 Mar 2019
A short review of the Samsung Galaxy S10 Plus
Smartphones continue to mature, making us wonder whether it’s worth releasing yearly iterations. Continue Reading
-
Tip
25 Mar 2019
Use Android Enterprise to lock down mobile devices
IT can integrate Android controls with EMM tools via APIs from Google's Android Enterprise program. These EMM capabilities can help IT manage updates and secure devices. Continue Reading
-
Answer
22 Mar 2019
How can IT consolidate UEM and IAM tools?
As UEM tools begin to add IAM features and vice versa, IT should consider ways to bridge the gap. Determine how to combine the capabilities of each tool. Continue Reading
-
Feature
21 Mar 2019
Mobile deployments get flexible with Android, device as a service
Mobile device admins have plenty of choices for their mobile deployments, including OSes and device ownership plans. Get the lay of the land with this Q&A. Continue Reading
-
Tip
18 Mar 2019
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
-
Opinion
12 Mar 2019
Citrix and VMware are all in on ‘workflow’ apps. So, what is a workflow app?
Workflow apps that help improve productivity on mobile devices (though useful on desktop, too). Continue Reading
-
News
04 Mar 2019
Microsoft HoloLens 2 headset brings AR to enterprises
The Microsoft HoloLens 2 headset is here, with updated specs and new features built from Microsoft's enterprise cloud offerings. It supports Windows Core OS and brings AR to IoT. Continue Reading
-
Quiz
04 Mar 2019
A quiz for Microsoft Intune admins on the tool's top features
Microsoft Intune has existed for almost a decade, and it has gone through a fair amount of changes. Test yourself on the features and functions of Intune. Continue Reading
-
Tip
27 Feb 2019
Learn Microsoft Intune's Android device management options
IT can use Microsoft Intune management for several Android device scenarios. Intune admins must learn how to enroll each device type and Intune's limits. Continue Reading
-
Opinion
27 Feb 2019
Samsung Knox will support OEMConfig, and is eyeing more IoT support
Samsung outlines their tactical and strategic plans to continue the success of Knox. Continue Reading
-
News
26 Feb 2019
Samsung Galaxy S10 phones coming with 5G, Wi-Fi 6 and more
Here's what you need to know about the new line of Samsung Galaxy S10 phones, including the S10, S10+, S10e and S10 5G. Continue Reading
-
Opinion
25 Feb 2019
What we learned about mobile security from real-world mobile threat defense customer data
Malware installs remain low, sideloading is surprisingly high, everyone agrees phishing is a threat, but there’s little consensus on network threats. Continue Reading
-
Tip
22 Feb 2019
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services. Continue Reading
-
Feature
20 Feb 2019
4 mobile security best practices for enterprise IT
Organizations should look to update their mobile security best practices due to COVID-19. IT must incorporate BYOD access to corporate data and other new mobile capabilities. Continue Reading
-
Opinion
18 Feb 2019
Zimperium mobile threat data shows malware is a worry but still impacts few devices
Zimperium found that the greatest share of mobile threats is device based. Continue Reading
-
Tip
15 Feb 2019
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios. Continue Reading
-
Opinion
12 Feb 2019
Why UEM could overshadow the EMM market
As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect and what organizations should do. Continue Reading
-
Opinion
12 Feb 2019
VMware acquires AetherPal for mobile support via screen viewing/remote control
An important tool to keep mission-critical mobile use cases running in the field. Continue Reading
-
News
08 Feb 2019
Samsung's 1 TB internal phone storage means headaches for IT
Samsung's new embedded Universal Flash Storage brings 1 TB of potential problems for IT. Continue Reading
-
Answer
04 Feb 2019
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
-
Tip
01 Feb 2019
Why Linux on Samsung DeX creates challenges for IT
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management. Continue Reading
-
Feature
30 Jan 2019
The end of hybrid Intune MDM and what IT needs to know
Some Microsoft Intune admins are unsure of what to do after the death of Intune hybrid MDM. IT should consider Azure or other MDM platforms to maintain key functions. Continue Reading
-
News
28 Jan 2019
Amazon WorkLink aims to simplify secure mobile device access
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups. Continue Reading
-
Opinion
28 Jan 2019
Mobile SSO: “It works on PC” just isn’t good enough
Jon Towles explains how to make seamless SSO work on iOS and shares a few thoughts on his favorite identity platforms. Continue Reading
-
Answer
25 Jan 2019
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
-
Opinion
24 Jan 2019
Enterprise-signed iOS apps on unmanaged devices is a pain. How should we proceed?
It’s worth it to see if you can make the alternatives (public distribution or avoiding BYOD) work instead for your enterprise apps for iOS. Continue Reading
-
Opinion
15 Jan 2019
Google announces Android Enterprise Recommended program for EMM vendors
Initial EMM vendors include Blackberry, Google Cloud, I3 Systems, IBM, Microsoft, MobileIron, SoftBank, SOTI, and VMware. Continue Reading
-
Answer
09 Jan 2019
Does enterprise file sync and share work on mobile devices?
Users who work with file sync-and-share apps on their mobile devices should be aware that auto-syncing works differently and that there are more security risks. Continue Reading
-
Opinion
09 Jan 2019
How do you block sideloaded app installation on iOS or Android?
It’s super easy for someone to download sideloaded apps onto their devices these days, so is it easy for corporations to block them, too? Continue Reading
-
Answer
28 Dec 2018
How can IT use the OAuth 2.0 protocol for iOS 12 devices?
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too. Continue Reading
-
Feature
19 Dec 2018
Watch out for these mobile technology trends in 2019
As 2018 ends, IT should be on the lookout for the newest trends in enterprise mobile technology. Here's what IT pros should have on their radar for 2019. Continue Reading
-
Answer
18 Dec 2018
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
-
Tip
17 Dec 2018
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively. Continue Reading
-
Answer
12 Dec 2018
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
Opinion
12 Dec 2018
iOS MDM needs to get better at BYOD, but Apple might make it harder (December 2018 update)
The iOS MDM experience for BYOD has fallen behind the latest versions of Android, and some customer needs aren’t being met. It’s time for some big changes in iOS device management. Continue Reading
-
Opinion
11 Dec 2018
Wandera mobile security data shows locked-down corporate policies help lessen risk
It’s important to contextualize all the data to ensure everyone understands and doesn’t just try to dunk on one another. Continue Reading
-
Tip
10 Dec 2018
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
-
Opinion
05 Dec 2018
Why identity management matters to mobility engineers
The next phase of your career can be paved by identity and access management. Continue Reading
-
Answer
03 Dec 2018
How can organizations implement mobile app personalization?
Organizations that want to boost user engagement on a mobile app should use personalization. They can follow these steps to implement personalization effectively. Continue Reading
-
Opinion
27 Nov 2018
What's driving the next-generation mobile user experience
Mobile users expect more from their employers these days. Thankfully, new technologies are making it possible for organizations to ride the latest evolution in mobile experiences. Continue Reading
- 27 Nov 2018
-
Infographic
27 Nov 2018
Evernote mobile app helps fill productivity gaps
Taking and organizing notes is an important part of many employees' jobs. Evernote can help business users manage notes, which can be even more critical on mobile devices. Continue Reading
-
Opinion
27 Nov 2018
How bad are mobile security threats? Our look at the numbers starts with Google and Lookout
Every vendor or company publishing mobile security data has an angle; let’s ditch that and just look at the numbers. Continue Reading
-
Tip
26 Nov 2018
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use. Continue Reading
-
Tip
26 Nov 2018
A developer's guide to mobile app personalization
User experience for a mobile app can improve significantly with the use of personalization. Learn about the benefits of app personalization and how to use it. Continue Reading
-
Answer
21 Nov 2018
What problems occur with Intune app protection for Outlook?
IT needs to configure settings a certain way to avoid problems when end users connect Outlook to Exchange Online. Here are steps to ensure that end users experience little friction. Continue Reading
-
Tip
15 Nov 2018
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined. Continue Reading
-
Answer
14 Nov 2018
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
-
Tip
09 Nov 2018
Prepare for the death of Intune's hybrid MDM
Microsoft is making some changes that could affect mobile device management with Intune. Here's how admins can stay prepared and reap the benefits of the stand-alone service. Continue Reading
-
Feature
06 Nov 2018
Cross-platform frameworks offer one-code path to mobile dev
Cross-platform app development frameworks enable developers to create native apps for iOS and Android. At a Progress conference, developers discuss different approaches. Continue Reading
-
Guide
02 Nov 2018
The complete Apple iOS guide for IT administrators
Apple iOS has become a legitimate enterprise option. IT admins must know about its security capabilities and how to manage devices. Developers should also learn the ins and outs of iOS app development. Continue Reading
-
Tip
01 Nov 2018
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates. Continue Reading
-
Opinion
25 Oct 2018
How to plan your mobile threat defense deployment
Practical advice on how to layer a mobile threat defense solution on top of your EMM, for single purpose, COPE, and BYOD devices. Continue Reading
-
Tip
22 Oct 2018
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices. Continue Reading
-
Tip
19 Oct 2018
Open source MDM offers flexibility, with challenges
Determine whether the open source route is best when it comes to managing mobile devices. To start, weigh the pros and cons, and then evaluate the market. Continue Reading
-
Feature
16 Oct 2018
How to sharpen a corporate mobile device strategy
Mobile devices aren't easy to manage. When organizations hand over a corporate device, IT should check a few things off of their to-do list, including security and cost factors. Continue Reading
-
News
10 Oct 2018
IT must beware Apple DEP issues with authentication
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic. Continue Reading
-
Tip
08 Oct 2018
Plan for the future of 5G in the enterprise
5G networks will bring speed and reduced latency to mobile business users that can take advantage of it. Get prepared for other changes that 5G will bring to the enterprise. Continue Reading
-
Tip
05 Oct 2018
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
-
Tip
03 Oct 2018
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system. Continue Reading
-
Opinion
03 Oct 2018
Even basics like email & Wi-Fi make mobile device management worth doing
Some companies may not have a do-or-die security or workflow use case for MDM, but a good reason to use it might still be right under their nose! Continue Reading
-
Feature
02 Oct 2018
Low-code development platforms bring speed, friction
Low code is enabling organizations to push out mobile apps more quickly. But, for some organizations, low-code platforms introduce organizational challenges. Continue Reading
-
Feature
27 Sep 2018
Mobile app testing tools embrace automation, open source
Organizations should think about mobile app testing from the beginning. Discover other best practices from the CTO of Sauce Labs, a mobile app testing company. Continue Reading
-
Opinion
25 Sep 2018
Intune Win32 app management & more EUC news from Microsoft Ignite 2018
Here are more end user computing announcements that caught our attention at Microsoft Ignite, including Desktop App Assure and new AutoPilot features. Continue Reading
-
Opinion
25 Sep 2018
What mobile device analytics can do for you
The hype around analytics is real. When it comes to mobile, this technology can help IT administrators glean more information about users, business processes and more. Continue Reading
-
Tip
24 Sep 2018
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps. Continue Reading
- 20 Sep 2018
-
Infographic
20 Sep 2018
Samsung Galaxy Note 9 improvements are small but powerful
Samsung's newest smartphone, the Note 9, is similar to the Note 8 at first glance. But there are improvements under the hood, so learn about what sets it apart in this overview. Continue Reading
-
Feature
17 Sep 2018
Keep track of evolving IAM products, technologies
IAM is at the heart of an organization's security strategy. To develop a strong IAM strategy, it's important to stay on top of the newest tools and trends. Continue Reading
-
Feature
13 Sep 2018
Fleetsmith expands options for Apple device management
Mobile device management can be a challenge for IT admins. Discover one vendor's approach and how security can make or break an organization's MDM strategy. Continue Reading
-
Answer
12 Sep 2018
What are the use cases for blockchain in mobile apps?
Blockchain can bring a variety of benefits to enterprise mobile apps. Explore some use cases before integrating this secure technology into mobile apps. Continue Reading
-
Opinion
11 Sep 2018
“Workflow” apps are a way to do mobile app security for SaaS
Where MDM isn’t possible, building workflows into other enterprise apps gives us a hook for security and management policies. Continue Reading
-
Answer
06 Sep 2018
How can IT determine the optimal smartphone lifespan?
Smartphones don't last forever. Here's how organizations can determine their lifecycles to avoid security issues and keep smartphones functioning at peak performance. Continue Reading
-
Tip
05 Sep 2018
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process. Continue Reading
-
Tip
04 Sep 2018
How to avert mobile device security threats
From man-in-the-middle attacks to malware, mobile devices are susceptible to an array of threats. Here's how to prevent them from infiltrating the business. Continue Reading