Despite the security risks, it's easy and common for users to download third-party mobile apps. To keep sideloaded apps off of end-user devices, IT must employ management tools. Continue Reading
IT professionals might think the hassle of jailbreaking a device deters users from sideloading iOS apps. Learn the other methods users turn to and why it's still dangerous. Continue Reading
With the coming of the new iPhone with the USB-C port, organizations might look at this new compatibility feature as the impetus for some changes to their device policies. Continue Reading
AR and VR have matured over the years as technologies, but the business use cases haven't been as sticky. However, the future could hold an unexpected use case -- desktops. Continue Reading
Shared iPad, previously exclusive to education, brings multi-user concepts to enterprise iPad use cases, and Apple admins should learn how it can support their organization. Continue Reading
Zimperium's MAPS provide organizations with a way to protect apps from development to after it hits app stores. Continue Reading
Both the iPad software and hardware are moving closer to the realm of laptop territory, while staying true to their tablet roots. Is this the ultimate 2-in-1? Continue Reading
The latest generation of Wi-Fi technology, Wi-Fi 6, can enable improved mobile UX for workers that rely on kiosks, smartphones and tablets for their daily on-premises tasks. Continue Reading
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
AV in 2020 on a mobile device sure does sound funny, so what is it really? Continue Reading
The updates are mostly incremental, but that’s a sign of Android Enterprise maturity. Continue Reading
Granted, vendors might not care at the moment and simply want consumers to pick these up. But, we had these same questions about the iPad. Continue Reading
Dark mode is popular with users, so it behooves any EUC vendor following the employee experience trend to add it to their apps. Continue Reading
I previously spent several months examining 2018 in depth, so let’s see what the first couple of mobile security reports show for 2019. Continue Reading
Maybe we’re starting to see more vocal pushback from the security community around iOS and Android security. Continue Reading
Working with the likes of Microsoft, Google, and VMware is a coup for Lookout. Continue Reading
A visual guide to how Android Enterprise, iOS MDM, and mobile threat defense apply to BYOD, COPE, embedded devices, and the extended enterprise. Continue Reading
GroundControl can “image” iOS devices and configure settings that MDM can’t touch, and enables shared device usage. Continue Reading
Yes, it’s been a long time since BYOD was the top buzzword in our industry, but that doesn’t mean we don’t have to worry about it anymore.! Continue Reading
Digital assistants keep making more and more appearances in platform software. Continue Reading
Putting your internal mobile apps out there for anyone to download might not seem like the obvious thing to do, but it brings distinct advantages and is in line with zero trust trends. Continue Reading
For in-house apps, Apple is now pushing the Custom Apps program (formerly the B2B program) as an alternative to enterprise-signed apps. Continue Reading
MDM migrations can be tricky, so EBF Migrator helps keep everything in sync. Continue Reading
Android has had this feature forever and finally Apple catches up, or does it? Continue Reading
A look at BlackBerry Intelligent Security, BlackBerry Enterprise Identity, and CylancePROTECT for Mobile. Continue Reading
Apple introduced a new BYOD-friendly management mode for iOS and macOS and renamed the existing Apple MDM modes. Get up to speed with the three new terms. Continue Reading
The risks of poor identity management are well known. Identity-as-a-service offerings can solve many identity-management-related issues. For companies that haven't yet, now is the time to get started. Continue Reading
A bunch of former AirWatch folks built an MDM migration tool, which could be useful as companies contemplate EMM refreshes, update deployments, or go through organizational changes. Continue Reading
Mobility isn’t a new concept, but it can sometimes be difficult to know where to start if you don’t have a framework in place, which is where NIST guidelines come in. Continue Reading
You can finally use hardware security keys, plus Apple does what Google has tried to do with extensions. Continue Reading
What does Apple need to do put the final polish on User Enrollment? Where will it be useful? What do the new iPhones mean? All this, and other notes. Continue Reading
Yes, it’s significant, but no, it doesn’t completely upend our mobile security model. Either way, it’s a good opportunity to go over security lessons. Continue Reading
Mixing work and personal usage on one device is a fundamental challenge that technology can only do so much to solve. Decide how to handle BYOD, or if you can nix it altogether. Continue Reading
Now is the time to start incorporating EMM into enterprise mobility strategies. Here's why EMM is important and how organizations can take advantage of its benefits. Continue Reading
Driven by the cloud, evolving mobile devices, unification and the need for better security, companies are vacating the premises and embracing unified endpoint management. Continue Reading
Apple and Google can lock down their operating systems with much more ease than Windows. This makes our lives easier (most of the time!). Continue Reading
Jon Towles explains how VMware Boxer uses key escrow to solve this long-time problem in a thoughtful and secure way. Continue Reading
Bas van Kaam’s printing series continues with one of the less-discussed options. Continue Reading
Now updated with Part 2! – The new privacy-focused User Enrollment mode for MDM is just what we’ve been waiting for. Continue Reading
Mobile app management SDKs and app wrapping are a large total addressable market in the enterprise. The BlackBerry Accelerator joins other tech for automatic SDK integration. Continue Reading
How do we put together the “any-any-any” message we’ve been hearing for years? With access policies that take the device, user, app, risks, and other factors into account. Continue Reading
Smartphones continue to mature, making us wonder whether it’s worth releasing yearly iterations. Continue Reading
Workflow apps that help improve productivity on mobile devices (though useful on desktop, too). Continue Reading
Samsung outlines their tactical and strategic plans to continue the success of Knox. Continue Reading
Malware installs remain low, sideloading is surprisingly high, everyone agrees phishing is a threat, but there’s little consensus on network threats. Continue Reading
Zimperium found that the greatest share of mobile threats is device based. Continue Reading
As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect and what organizations should do. Continue Reading
An important tool to keep mission-critical mobile use cases running in the field. Continue Reading
Jon Towles explains how to make seamless SSO work on iOS and shares a few thoughts on his favorite identity platforms. Continue Reading
It’s worth it to see if you can make the alternatives (public distribution or avoiding BYOD) work instead for your enterprise apps for iOS. Continue Reading
Initial EMM vendors include Blackberry, Google Cloud, I3 Systems, IBM, Microsoft, MobileIron, SoftBank, SOTI, and VMware. Continue Reading
The iOS MDM experience for BYOD has fallen behind the latest versions of Android, and some customer needs aren’t being met. It’s time for some big changes in iOS device management. Continue Reading
It’s important to contextualize all the data to ensure everyone understands and doesn’t just try to dunk on one another. Continue Reading
The next phase of your career can be paved by identity and access management. Continue Reading
Mobile users expect more from their employers these days. Thankfully, new technologies are making it possible for organizations to ride the latest evolution in mobile experiences. Continue Reading
Every vendor or company publishing mobile security data has an angle; let’s ditch that and just look at the numbers. Continue Reading
Practical advice on how to layer a mobile threat defense solution on top of your EMM, for single purpose, COPE, and BYOD devices. Continue Reading
Some companies may not have a do-or-die security or workflow use case for MDM, but a good reason to use it might still be right under their nose! Continue Reading
Here are more end user computing announcements that caught our attention at Microsoft Ignite, including Desktop App Assure and new AutoPilot features. Continue Reading
The hype around analytics is real. When it comes to mobile, this technology can help IT administrators glean more information about users, business processes and more. Continue Reading
Where MDM isn’t possible, building workflows into other enterprise apps gives us a hook for security and management policies. Continue Reading
The chances of getting malware on your phone are pretty slim, but social media and messaging apps make phishing a mobile threat to be concerned about. Continue Reading
If consumers get in the habit of installing Android apps from unknown sources, some of our assumptions around Android BYOD, management, and security will have to change. Continue Reading
Mobile devices with AI and virtual assistants will affect the enterprise, as well as consumers. Learn how to prep your organization for the future. Continue Reading
Jason Bayton knows Android management inside and out. Today, he outlines the strong case for switching to Android Enterprise work profiles in BYOD scenarios. Continue Reading
With the MaaS360 Assistant, potentially increase employee mobile productivity. Continue Reading
Microsoft has failed in the tablet market before, but the Surface Go could be a promising second chance for the company. Learn its features and pricing that set it apart. Continue Reading
Work-related email and other communications have spilled over into after-work hours for many employees today. But should the IT department get involved in monitoring that? Continue Reading
Google's new cross-platform framework, Flutter, could threaten Android's existence. Explore three theories about why the company developed its new tool. Continue Reading
The next generation of smartphones is more rugged than ever, and this trend will change the ruggedized device market. Learn how and know what to expect in the next few years. Continue Reading
Leostream just released version 9.0 of their connection broker, and since we last caught up, they’re now offering a gateway. Continue Reading
Digital assistants and access in the workplace are a constant struggle. How difficult is it for the enterprise to keep Siri under control on BYOD or COPE devices? Continue Reading
Organizations today support such a variety of devices that they need a way to deliver apps more seamlessly. Cross-platform development is a new reality that can help. Continue Reading
IT is changing priorities when it comes to fitting mobile management into end-user computing strategies. Learn what some recent stats show about the new age of mobile. Continue Reading
Mobile devices enable users to make crucial security decisions. Here's how IT can obtain more control to prevent phishing attacks from occurring in the first place. Continue Reading
For now, the uses cases still seem to just involve basic productivity. Continue Reading
The current identity management market is evolving, but it isn't yet fully formed. Discover the technologies that will change ID management and how to use them. Continue Reading
AI technology is growing fast, and end-user computing administrators need to be prepared for the multitude of benefits it can bring IT and employees. Continue Reading
Don't assume that the iPad Pro always works for the enterprise. IT pros should first evaluate when it's best to use an iPad rather than a PC or laptop. Continue Reading
AI is one of the hottest new technologies in mobile. Evaluate the AI market and determine how your organization can take advantage of the latest advances in mobile tech. Continue Reading
As demand for smarter mobile apps continues to rise, developers will embrace artificial intelligence, augmented reality and more robust security models to fill that gap in 2018. Continue Reading
MAM is essential, yet challenging and confusing; this series of articles covers everything you need to know. Part 2 takes a deep look at AppConfig MAM, stand alone MAM, and other MAM techniques. Continue Reading
The best IT shops know how to apply design thinking to the mobile app development process, keeping the mobile user experience at the forefront. Continue Reading
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use. Continue Reading
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
As enterprise systems become more integrated, ownership shifts downstream, exposing gaps among accountability, coordination and ...
Compare the latest architecture developments, as well as advanced communications and collaboration UC platform features, offered ...
As systems interconnect, decision order and timing increasingly shape outcomes, narrowing options and increasing adjustment ...
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that ...
Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be ...
Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, ...