Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
How to address mobile compliance in a business setting
When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Continue Reading
How to fix an iPhone Personal Hotspot that's not working
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT and users must know how to avoid and fix these issues for remote work. Continue Reading
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat. Continue Reading
-
How to set up kiosk mode for iPad and other OSes
Tablet-based kiosks became increasingly popular for customer self-service during the pandemic. Organizations managing multiple kiosks need to understand how to set up kiosk mode. Continue Reading
How to protect mobile devices from malware in the enterprise
Smartphones can be just as susceptible to cybersecurity threats as desktops, so it's important for organizations to know how to protect their endpoints from mobile malware. Continue Reading
enterprise mobility management (EMM)
Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.Continue Reading
mobile application management (MAM)
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.Continue Reading
How to enable User Enrollment for iOS in Microsoft Intune
User Enrollment in iOS can separate work and personal data on BYOD devices. IT teams should learn how to enable it in Microsoft Intune and how it can affect user experience.Continue Reading
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments.Continue Reading
How long can smartphones last in the enterprise?
Many organizations aim to use the smartphones they've invested in for as long as possible, but outdated or malfunctioning devices present risks that can cost more in the long run.Continue Reading
-
How to create a work profile on Android devices
When organizations enable BYOD for Android users, they should look to Android Enterprise to create work profiles on those personal devices via an MDM.Continue Reading
Understanding how long iPhones can last in the enterprise
Organizations may want to use the devices they invest in for as long as possible, but how long does Apple support iPhones? Explore the factors that affect the lifespan of iPhones.Continue Reading
How organizations should handle mobile device lifecycles
Understanding the mobile device lifecycle can help IT manage endpoints from purchase to retirement, with different tools and processes supporting devices at different stages.Continue Reading
How does Android 13 work profile improve IT management
When users bring personal Android devices to the workplace, IT should consider using work profiles on these devices. Learn about the latest work profile features on Android 13.Continue Reading
5 MDM features and platforms for small businesses
When SMBs deploy mobile devices, they need to find a viable MDM that can meet their needs. Read about 5 key features to look for in an MDM and some strong choices for vendors.Continue Reading
Preventing attacks on mobile applications in the enterprise
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks that come with mobile apps and how to mitigate them.Continue Reading
Understanding QR code security issues for enterprise devices
QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them.Continue Reading
How to perform a full remote wipe on an iPhone
A remote wipe is a vital security tool as mobile devices become more common in the workplace. In organizations allowing work data on iPhones, IT should know the iOS wipe options.Continue Reading
How to create a mobile app for a small business
Regularly updated mobile applications are becoming essential for small businesses. The first step for SMBs is knowing all the options for building and maintaining mobile apps.Continue Reading
How to perform a remote wipe of Office 365 on a smartphone
Employees like having email and other Office 365 applications on their smartphones. There are security risks that come with mobile devices accessing corporate data, however.Continue Reading
The role of mobile email management in the enterprise
Mobile email management is a key facet of overall mobility management and, when properly deployed, will streamline functions and create a more secure environment.Continue Reading
Finding the right Apple TV management software
When organizations deploy Apple TV for digital signage or displaying business data, the IT department can't overlook the management of these devices.Continue Reading
How to sideload iOS apps and why it's dangerous
IT professionals should be aware of how to sideload iOS applications and why it might be dangerous and inadvisable to do so. Learn the two most common sideload methods below.Continue Reading
What can organizations do to address BYOD privacy concerns?
BYOD conveniently puts work and personal data on one device, but this creates privacy concerns. Organizations should take steps to ensure both employee privacy and device security.Continue Reading
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems.Continue Reading
A guide to enrolling Apple devices in Jamf
Organizations should consider management platforms from specialized vendors, such as Jamf, for specific OSes including Apple iOS. Learn how to enroll Apple devices into Jamf here.Continue Reading
How text message phishing can affect the enterprise
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices.Continue Reading
Protecting mobile devices from text-based phishing
Phishing emails often get IT teams' attention, but text-based phishing is a growing threat. Organizations must understand the risks of mobile phishing and how to prevent it.Continue Reading
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also overlap. Knowing their differences is important.Continue Reading
How Intune fits into the Microsoft Endpoint Manager console
The Microsoft Endpoint Manager platform provides organizations with a centralized console for numerous Microsoft services, and IT admins should learn how Intune fits into this.Continue Reading
Should IT use Apple Business Manager without MDM?
With the Apple Business Manager service, organizations can control Apple ID on device apps. But this may not be enough functionality for organizations to forego MDM entirely.Continue Reading
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with multiple ways to steal data. These threats -- from network spoofing to phishing texts -- endanger companies as much as individuals.Continue Reading
Why a mobile security policy is a must-have corporate policy
A well-defined mobile device security policy that educates employees on the proper use of BYODs can help seal off vulnerabilities in corporate networks and bolster threat defense.Continue Reading
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well.Continue Reading
Compare Android Enterprise vs. Android Device Administrator
In most cases, Android Enterprise will serve for organizations' Android management needs, but IT admins should understand how Android Device Admin fits into the picture.Continue Reading
Improve mobile hotspot security in 5 steps
Users may not hesitate to connect to a mobile hotspot, but that doesn't mean IT should always allow it. Learn the threats these hotspots pose and how to handle them.Continue Reading
Manage mobile operating system updates with Intune
Mobile administrators should enforce certain platform version minimums through mobile OS update policies for their devices, and Intune has a broad feature set to support this task.Continue Reading
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below.Continue Reading
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise.Continue Reading
What new Android 11 features should IT know about?
Android 11's public beta has revealed several new features that IT admins should take note of, such as incremental app installs and more detailed information on app data access.Continue Reading
Top iOS 13 mobile device management features for IT
The new iOS 13 mobile device management features Apple introduced help IT with device enrollment and other tasks, but IT must determine how these features fit into its plans.Continue Reading
How does the aggressive iOS 13 RAM management affect UX?
Apple's iOS 13 comes with RAM management that may terminate mobile apps that aren't in use. Apple has somewhat addressed this with updates, but some of the core issues remain.Continue Reading
Create a mobile BYOD policy for the coronavirus pandemic
The COVID-19 pandemic is forcing organizations to support remote work whenever possible. Organization can follow a few key steps to enable productive remote work on mobile devices.Continue Reading
Understanding the features of Android enterprise device management
Don't get overwhelmed when managing Android devices in the enterprise. Check out this cheat sheet to understand and use features that make device management a breeze.Continue Reading
7 enterprise policies that enhance mobile user experience
Mobile admins must prioritize the mobile user experience they provide on their mobile fleet by deploying policies such as IT approving app permissions and single sign-on.Continue Reading
What Wi-Fi 6 phones and tablets can provide organizations
The latest generation of Wi-Fi technology, Wi-Fi 6, can enable improved mobile UX for workers that rely on kiosks, smartphones and tablets for their daily on-premises tasks.Continue Reading
Advances in enterprise mobile device security management
Learn how IT must take a holistic management approach to stop every mobile threat that comes its way with the right tools, policies and device-specific best practices.Continue Reading
5 strategic steps to blunt mobile device security threats
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it.Continue Reading
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API.Continue Reading
How to configure Outlook on mobile devices with Intune
Intune admins must know how to enable mobile users' needs, including having quick access to Outlook. Learn the five steps that IT must take to configure Outlook on mobile devices.Continue Reading
Standardize mobile UI with Microsoft Launcher for Android
The Microsoft Launcher for Android functionality in Intune allows IT to provide a single UI for its Android devices. IT can configure it with JSON or Configuration Designer data.Continue Reading
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed.Continue Reading
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions.Continue Reading
8 MobileIron features that EMM admins should know
IT professionals should make the most of their EMM platform by learning the potentially overlooked features. MobileIron admins should learn about the following eight features.Continue Reading
4 factors that should shape a BYOD mobile policy
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy.Continue Reading
Enterprise wearables bring benefits, management challenges
Enterprise mobility isn't just about smartphones and tablets. Wearable device adoption is growing, so IT should be ready to support this dynamic category of mobile devices.Continue Reading
Learn about Microsoft's changes to the Office mobile app
In 2019, Microsoft announced the Office mobile app as an entry point for its productivity suite and developed Office Intelligent Services features that can improve productivity.Continue Reading
How to install root CA certificates on iPhones and iPads
Apple iPads and iPhones can connect securely to enterprise networks, but IT admins need to install root certificates or CA certificates to the devices first.Continue Reading
Deploy kiosk devices with the Managed Home Screen Android app
The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best Managed Home Screen Android management options.Continue Reading
Develop a strong smartphone policy for the enterprise
Organizations with managed mobile users need to develop a smartphone policy, on everything from data use to app installation, to ensure security and smooth business processes.Continue Reading
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well.Continue Reading
Google OEM config program enables quick updates to EMM
Google's OEM Config program incentivizes Android smartphone OEMs to help EMM vendors quickly support device-specific management features by uploading APIs to the Google Play Store.Continue Reading
How to manage Office 365 mobile apps for business
Microsoft Office 365 applications allow users to send emails and edit numerous types of documents, but the mobile apps present a number of adoption issues that IT should learn about.Continue Reading
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones.Continue Reading
New Android Q features could relieve IT headaches
IT should get to know the latest Android Q features set to release with the new OS, but they also must learn about key features that Google will deprecate such as Device Admin.Continue Reading
Why BYOD management is a moving target
Mixing work and personal usage on one device is a fundamental challenge that technology can only do so much to solve. Decide how to handle BYOD, or if you can nix it altogether.Continue Reading
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market.Continue Reading
3 Intune app management practices that IT pros should know
Intune admins should learn the basics of Intune app management for deploying, wrapping and securing applications. Find out why each step is crucial and how IT can accomplish them.Continue Reading
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data.Continue Reading
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps.Continue Reading
Apple and Google simplify BYOD management with new OSes
IT must weigh user privacy and endpoint security when it shapes its BYOD policies. Luckily, new features in iOS 13 and Android Q make this balance easier for IT to strike.Continue Reading
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies.Continue Reading
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire.Continue Reading
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security.Continue Reading
Navigate Intune app deployment for mobile devices
With the right Intune app deployment methods, IT can manage its Android and iOS users' apps, but the practices are different depending on the OS and the type of mobile apps.Continue Reading
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market.Continue Reading
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors.Continue Reading
Smartphone lifecycle plans are crucial in today's workplace
When IT creates a smartphone lifecycle policy, it must factor in its available resources and its users' needs. Learn why these policies are necessary and how IT should design them.Continue Reading
Why do mobile admins need Android Enterprise management?
Google is pushing Android Enterprise management and deprecating Device Admin features. Find out why IT should fall in line and migrate to Android Enterprise.Continue Reading
How AI chatbots for enterprise use can help mobile admins
Mobile chatbots that include AI technologies can help organizations simplify user and IT workflows. Learn exactly how these chatbots can fit within a mobility management strategy.Continue Reading
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now.Continue Reading
Mobile authentication best practices quiz for IT pros
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly.Continue Reading
As enterprise device choice grows, so should a CYOD strategy
It's been 11 years since the iPhone came to market, but IT admins are still struggling with CYOD strategies. One reason? Choose your own device is now choose your own devices.Continue Reading
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans.Continue Reading
5 tips for iOS and Android kiosk device management
IT pros can deploy configurations for kiosk devices with mobile management tools, such as Microsoft Intune. Consider these tips to ensure kiosk devices function as intended.Continue Reading
Mobile deployments get flexible with Android, device as a service
Mobile device admins have plenty of choices for their mobile deployments, including OSes and device ownership plans. Get the lay of the land with this Q&A.Continue Reading
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication.Continue Reading
A quiz for Microsoft Intune admins on the tool's top features
Microsoft Intune has existed for almost a decade, and it has gone through a fair amount of changes. Test yourself on the features and functions of Intune.Continue Reading
Learn Microsoft Intune's Android device management options
IT can use Microsoft Intune management for several Android device scenarios. Intune admins must learn how to enroll each device type and Intune's limits.Continue Reading
What's driving the next-generation mobile user experience
Mobile users expect more from their employers these days. Thankfully, new technologies are making it possible for organizations to ride the latest evolution in mobile experiences.Continue Reading
Take a methodical approach to mobile deployment
Purchasing and enrolling a device fleet can get messy if organizations let it get out of hand. Here's how to keep one of the first steps of the MDM process simple and streamlined.Continue Reading
An admin's guide to discover Microsoft Intune updates
Microsoft Intune is always changing, so administrators should know what's new and what's coming down the pike. Find out how to begin and where to look for new updates.Continue Reading
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system.Continue Reading
Explore new iOS security features
Explore the latest features from Apple and the new iOS 12, an operating system that will give IT more control over iOS device management and security in the enterprise.Continue Reading
Understand the tools for managing Android devices in the enterprise
Over the past year, Google has released new capabilities and features to manage Android enterprise devices. IT should be aware of these recent updates for Android device management.Continue Reading
How IoT edge devices fit into unified endpoint management
Unified endpoint management strategies are evolving to include not just mobile devices, but sensor-connected IoT devices, too. Intelligent edge management can help.Continue Reading
Should IT monitor mobile device usage for work-life balance?
Work-related email and other communications have spilled over into after-work hours for many employees today. But should the IT department get involved in monitoring that?Continue Reading
Explore new options for Apple enterprise device management
Apple announced many of its updates at WWDC. Learn about some enterprise management features that have gone under the radar, including Apple Business Manager.Continue Reading
How IT can manage Office 365 for mobile devices
Office 365 is a cornerstone of office work, but how should IT manage the platform for mobile users? Find strategies to manage the software effectively in the enterprise.Continue Reading
How to manage security threats to mobile devices
As mobile device security threats increase, IT administrators should know what they are up against and develop strategies to secure mobile devices from cyber attacks.Continue Reading