Tips
Tips
-
Apple and Google simplify BYOD management with new OSes
IT must weigh user privacy and endpoint security when it shapes its BYOD policies. Luckily, new features in iOS 13 and Android Q make this balance easier for IT to strike. Continue Reading
-
Pros and cons of smartphone sensor data analysis
With the help of smartphone sensor data, IT can learn about its users' behaviors and improve operations and workflows, but collecting this data has some notable risks as well. Continue Reading
-
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
-
How to use Intune app protection without MDM enrollment
Intune app protection allows IT admins to control devices without enrolling them in an MDM or UEM platform. Here's what IT pros can do with the feature. Continue Reading
-
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security. Continue Reading
-
Navigate Intune app deployment for mobile devices
With the right Intune app deployment methods, IT can manage its Android and iOS users' apps, but the practices are different depending on the OS and the type of mobile apps. Continue Reading
-
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors. Continue Reading
-
Smartphone lifecycle plans are crucial in today's workplace
When IT creates a smartphone lifecycle policy, it must factor in its available resources and its users' needs. Learn why these policies are necessary and how IT should design them. Continue Reading
-
Transition to Android Enterprise management before Android Q
With the upcoming deprecation of Device Admin APIs, IT should look at the possibility of migration to Android Enterprise, Google's endorsed API program, for device management. Continue Reading
-
How AI chatbots for enterprise use can help mobile admins
Mobile chatbots that include AI technologies can help organizations simplify user and IT workflows. Learn exactly how these chatbots can fit within a mobility management strategy. Continue Reading
-
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are. Continue Reading
-
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability. Continue Reading
-
5 tips for iOS and Android kiosk device management
IT pros can deploy configurations for kiosk devices with mobile management tools, such as Microsoft Intune. Consider these tips to ensure kiosk devices function as intended. Continue Reading
-
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
-
Use Android Enterprise to lock down mobile devices
IT can integrate Android controls with EMM tools via APIs from Google's Android Enterprise program. These EMM capabilities can help IT manage updates and secure devices. Continue Reading
-
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
-
Learn Microsoft Intune's Android device management options
IT can use Microsoft Intune management for several Android device scenarios. Intune admins must learn how to enroll each device type and Intune's limits. Continue Reading
-
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services. Continue Reading
-
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios. Continue Reading
-
Why Linux on Samsung DeX creates challenges for IT
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management. Continue Reading
-
Mobile application developer skills to know for an interview
One of the best ways to succeed in your mobile app dev career is to master the art of the interview. Review need-to-know technical skills and how to communicate them effectively. Continue Reading
-
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
-
What are the benefits of QR code enrollment?
IT can enroll devices into MDM using a QR code, which is a more attainable option as support expands. Discover the benefits of this process, including improved workflow and ease of use. Continue Reading
-
A developer's guide to mobile app personalization
User experience for a mobile app can improve significantly with the use of personalization. Learn about the benefits of app personalization and how to use it. Continue Reading
-
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined. Continue Reading
-
Prepare for the death of Intune's hybrid MDM
Microsoft is making some changes that could affect mobile device management with Intune. Here's how admins can stay prepared and reap the benefits of the stand-alone service. Continue Reading
-
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates. Continue Reading
-
Stay updated on the Android Enterprise Recommended program
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices. Continue Reading
-
Open source MDM offers flexibility, with challenges
Determine whether the open source route is best when it comes to managing mobile devices. To start, weigh the pros and cons, and then evaluate the market. Continue Reading
-
Plan for the future of 5G in the enterprise
5G networks will bring speed and reduced latency to mobile business users that can take advantage of it. Get prepared for other changes that 5G will bring to the enterprise. Continue Reading
-
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
-
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system. Continue Reading
-
Pros of dedicated API services for cross-platform mobile apps
One API can rule them all -- but developers shouldn't be surprised if problems occur. Delve into the pros and cons of dedicated API services for cross-platform apps. Continue Reading
-
What are the benefits of mobile app A/B testing?
Mobile app A/B testing is the best way to prevent buggy features from reaching your users. Learn the benefits and discover how to get started with the process. Continue Reading
-
How to avert mobile device security threats
From man-in-the-middle attacks to malware, mobile devices are susceptible to an array of threats. Here's how to prevent them from infiltrating the business. Continue Reading
-
How middleware platforms can benefit mobile apps
Organizations that build mobile apps with a lot of integrations with back-end services should consider middleware. But first, be aware of these pros and cons. Continue Reading
-
How Apple DEP works and why it's important
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management. Continue Reading
-
Combat mobile device security threats at home and abroad
Employees that travel for business face a higher risk of a mobile security breach. Take these steps to ensure that your mobile device fleet is secure. Continue Reading
-
Explore new options for Apple enterprise device management
Apple announced many of its updates at WWDC. Learn about some enterprise management features that have gone under the radar, including Apple Business Manager. Continue Reading
-
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle. Continue Reading
-
How to avoid wasting time in a mobile app development project
A tedious, drawn-out app development process can frustrate everyone involved. Follow these five tips and tricks to ensure that developers don't waste time. Continue Reading
-
On-device machine learning offers security, reduced latency
Where should IT process machine learning data? Mobile devices can now process machine learning, but it's important to evaluate all the options -- including the cloud. Continue Reading
-
Explore new features of Android Pie
Google released the public beta of Android's latest operating system, Android Pie, which includes new features for the enterprise. Discover what this latest version has to offer. Continue Reading
-
Explore options for automatic device enrollment
Enrolling mobile devices can be a hassle, especially for larger organizations. Explore these programs that can help automate the process and let IT focus on more important tasks. Continue Reading
-
How to track mobile app performance metrics
Developers that don't track mobile app health will get little insight into the user experience. Learn these effective strategies to track and understand mobile app performance metrics. Continue Reading
-
Be prepared to handle a mobile security breach
When it comes to cybersecurity, mobile security often falls by the wayside. Discover these techniques to prepare for a mobile security incident should it affect your organization. Continue Reading
-
Understand chatbot use cases and features for business
The bot that chattered with you over AOL Instant Messenger isn't too far off from the way chatbot technology can work in corporate mobile apps. Continue Reading
-
Explore the pros and cons of identity federation management
Identity federation is a relatively new technology in mobile, but it comes with challenges. Understand how to make deployment painless before adopting it. Continue Reading
-
Five steps to effective usability testing for mobile apps
To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it out. These tips can help perfect the process. Continue Reading
-
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies. Continue Reading
-
The new role of identity and authentication in the enterprise
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first. Continue Reading
-
How to approach mobile password management for the enterprise
When simple passwords no longer provide sufficient security, look to other options. Here are some ways to modernize password management for your enterprise. Continue Reading
-
Pros and cons of a multi-factor authentication mobile app
MFA can improve the security of an app by using a layered approach rather than one that relies on passwords alone. To know whether it's right for your app, weigh its pros and cons. Continue Reading
-
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision. Continue Reading
-
A mobile app security checklist for developers
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app. Continue Reading
-
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
VMware AirWatch policy and configuration tips you might not know about
There are some under-the-radar features that IT pros can take advantage of when it comes to VMware AirWatch configuration and policy settings. Automation can also be beneficial. Continue Reading
-
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
-
Eight factors when choosing mobile application development tools
When it comes to picking out a mobile app development tool it is important to keep lifecycle management, integration, internal expertise and more in mind. Continue Reading
-
An introduction to mobile application design
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail. Continue Reading
-
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading
-
Three essentials for an effective mobile app strategy
With mobile apps invading the enterprise, it's time to develop a strategy using a set of universal app development tools. Continue Reading
-
Weighing pros and cons of mobile application management
Rather than focusing on gaining access to users' devices, MAM puts the power squarely in IT's hands to protect mobile applications on any device. Continue Reading
-
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process. Continue Reading
-
Get to know Android for Work profiles and productivity features
Now that Android for Work is out, we dig into the features of the program’s work profiles and productivity apps. Continue Reading
-
Apple Device Enrollment Program streamlines deployment, MDM
The Apple Device Enrollment Program allows IT pros to automate deployment, and they can also preset mandatory MDM configurations out of the box. Continue Reading
-
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
-
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat. Continue Reading
-
Google Glass at Work could make some jobs easier
With Glass for Work, Google aims to overcome the challenges the "smart glasses" have faced in the consumer marketplace. The new focus on enterprise could help field workers, manufacturers and engineers get more done hands-free. Continue Reading
-
How Box integration works with other enterprise apps
To get the most out of Box, use its APIs to integrate your enterprise applications with its cloud storage platform. Continue Reading
-
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading
-
Five alternatives to Microsoft for mobile office applications
There are plenty of alternatives to Microsoft Office out there. Check out other mobile office apps that help you view and edit docs. Continue Reading
-
App delivery techniques: Virtualization and Web-based apps
Web-based apps and mobile desktop virtualization are gaining traction as valid mobile app delivery techniques, but each option has specific use cases. Continue Reading
-
How to manage and modify SE Android
SE Android protects against malware, but it can also block regular functions. You can modify SE Android settings to re-enable those apps and features. Continue Reading
-
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
-
Limiting mobile bandwidth consumption to improve network performance
When a lot of devices access your network, the network slows down. Adding WAPs and upgrading the LAN can help you limit bandwidth consumption. Continue Reading
-
How cloud storage and collaboration are changing email communications
Email communications aren't dead, but social networking, cloud storage and collaboration tools have made it easier for employees to work together. Continue Reading
-
Pros and cons of mobile device management software
There are some security gaps that MDM can't fill, but mobile device management software is still a must for many companies. Continue Reading
-
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading
-
How iPhone encryption and data protection work
With Apple's iPhone encryption and data protection, you can take advantage of strong security. But make sure users enable the right iOS data encryption settings. Continue Reading
-
Surface RT review: The good, the bad and the ugly
The Surface RT tablet comes with Office and has good battery life, but it has some drawbacks, too. This Surface RT review explains the pros and cons. Continue Reading
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company. Continue Reading
-
Comparing mobile operating systems and application environments
Each mobile operating system has a different application environment, but that could be more of an advantage for businesses than a detriment. Continue Reading
-
Top five mobile application vulnerabilities
Devices are often blamed for insecurities, but mobile app vulnerabilities are insidious. Make sure employees use common sense when they download apps. Continue Reading
-
Best practices for developing mobile cloud apps revealed
Expert Bill Claybrook explains the right way to go about creating mobile cloud applications. Continue Reading
-
How to develop a monitoring system for mobile cloud-based applications
If your mobile workforce uses cloud-based applications to work from their smartphones and tablets, consider a monitoring system to ensure the apps are working. Continue Reading
-
Android versus iOS security: Features, policies and controls
There’s not a clear winner when it comes to Android versus iOS security, but with iOS’ app security in one corner and Android’s encryption in the other, it makes for a good fight. Continue Reading
-
How an acceptable use policy and app control can improve BYOD success
Organizations that adopt BYOD should have an acceptable use policy to help with security and app control. When users know expectations and consequences, BYOD gets easier for IT. Continue Reading
-
Business email security and the risks of personal Gmail forwarding
Business email security might not be on employees’ minds when they forward corporate mail to more user-friendly Gmail accounts, so IT should take steps to protect corporate data. Continue Reading
-
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices. Continue Reading
-
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets. Continue Reading
-
Meeting technical requirements for mobile health care deployments
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
-
Mobile device strategy bypassed as enterprises face tablet invasion
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
-
Does a mobile VDI platform make sense for your users?
Mobile VDI isn't always a good fit. Ask these five questions to determine whether a mobile VDI platform makes sense for your users. Continue Reading
-
Mobile patching is No. 1 challenge of mobile device security
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
-
Accessing mobile unified communications with virtual desktops
Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified ... Continue Reading
-
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network ... Continue Reading
-
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide... Continue Reading
-
WiMAX devices
WiMAX devices will become more readily available as carriers deploy widespread WiMAX service. Continue Reading