Mobile management
When organizations allow end-user mobile devices to perform work-related tasks and view business data, they must have the proper management practices in place. This will help mobile users perform their tasks securely and efficiently. IT teams should familiarize themselves with the management platforms and practices that support mobile devices in a business setting.
Top Stories
-
Answer
09 Jun 2023
Does a hotspot work when a mobile device has no service?
Cellular service is necessary for establishing a hotspot connection. IT must know what to do when remote users are dealing with both Wi-Fi and service issues. Continue Reading
-
Tip
05 Jun 2023
How to troubleshoot when a hotspot is not working on Android
Troubleshooting mobile hotspots on Android devices requires IT to put in the documentation, training and practices to best help remote and hybrid users. Continue Reading
-
Feature
30 May 2023
7 key benefits of enacting a BYOD policy
While some benefits of a BYOD program are obvious, such as allowing users to only carry one endpoint, other benefits are worth exploring, such as lowering corporate emissions. Continue Reading
-
Tip
19 May 2023
How to fix an iPhone Personal Hotspot that's not working
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT and users must know how to avoid and fix these issues for remote work. Continue Reading
-
Tip
11 May 2023
How to exit kiosk mode on any OS
Manually exiting kiosk mode is still necessary in the age of mobile device management for convenience and when it's time to remove kiosks at their end of life. Continue Reading
-
Tip
26 Apr 2023
Setting up Windows 11 kiosk mode with 4 different methods
Windows 11 kiosk mode offers improvements over previous versions for desktop admins. IT should learn these four methods and choose the best deployment for their organization. Continue Reading
-
Tip
18 Apr 2023
Getting started with kiosk mode for the enterprise
A kiosk can serve several purposes as a dedicated endpoint. Understanding those possibilities and their benefits and challenges is key to deploying kiosk mode for the enterprise. Continue Reading
-
Tip
17 Apr 2023
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
-
Tip
14 Apr 2023
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat. Continue Reading
-
Tip
10 Apr 2023
How to set up kiosk mode for iPad and other OSes
Tablet-based kiosks became increasingly popular for customer self-service during the pandemic. Organizations managing multiple kiosks need to understand how to set up kiosk mode. Continue Reading
-
Tip
04 Apr 2023
How to protect mobile devices from malware in the enterprise
Smartphones can be just as susceptible to cybersecurity threats as desktops, so it's important for organizations to know how to protect their endpoints from mobile malware. Continue Reading
-
Tip
23 Mar 2023
How to create a mobile device management policy for your org
A mobile device management policy creates several essential benefits for an organization, like security measures and data and application guidelines for corporate information. Continue Reading
-
Tip
14 Mar 2023
How to use the iPadOS file manager in the enterprise
Organizations can use the iPadOS Files app to manage files locally or in the cloud. Learn the pros and cons of both storage types and how to use them in the native file manager. Continue Reading
-
Tip
10 Mar 2023
How does enterprise file management in iOS work?
It's important to ensure that files are secure and easy to work with on enterprise mobile devices. In iOS, the Files app is a key tool for personal and corporate file management. Continue Reading
-
Tip
07 Mar 2023
What are the best file managers for Mac devices?
If the native macOS file manager is lacking, IT can look to third-party options for advanced features. Commander One, ForkLift and Path Finder are three alternatives to consider. Continue Reading
-
Tip
01 Mar 2023
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe. Continue Reading
-
Tip
23 Feb 2023
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe. Continue Reading
-
Tip
16 Feb 2023
How to enable User Enrollment for iOS in Microsoft Intune
User Enrollment in iOS can separate work and personal data on BYOD devices. IT teams should learn how to enable it in Microsoft Intune and how it can affect user experience. Continue Reading
-
Tip
14 Feb 2023
How to restore a deleted Android work profile
If a user deletes an Android work profile or switches devices, they will need to go through the process to restore it. Learn the simple steps to reenroll an Android work profile here. Continue Reading
-
Tip
10 Feb 2023
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments. Continue Reading
-
Tip
10 Feb 2023
How to delete or disable an Android work profile
When users leave an organization or lose a device, it's time to remove their Android work profile. Learn three methods to get rid of a work profile on a BYOD device. Continue Reading
-
Tip
09 Feb 2023
How long can smartphones last in the enterprise?
Many organizations aim to use the smartphones they've invested in for as long as possible, but outdated or malfunctioning devices present risks that can cost more in the long run. Continue Reading
-
Tip
02 Feb 2023
How long should you support Android phones in the enterprise?
The Android OS can run on a wide range of devices, but how long should enterprise organizations support Android phones? Find out which factors help determine the lifecycle length. Continue Reading
-
Tip
31 Jan 2023
Understanding how long iPhones can last in the enterprise
Organizations may want to use the devices they invest in for as long as possible, but how long does Apple support iPhones? Explore the factors that affect the lifespan of iPhones. Continue Reading
-
Feature
25 Jan 2023
3 tips to reduce enterprise e-waste
Sustainable device management is an important area CIOs and IT teams should focus on to support organizational ESG goals. Learn how it can also help lower e-waste and save money. Continue Reading
-
Tip
19 Jan 2023
How organizations should handle mobile device lifecycles
Understanding the mobile device lifecycle can help IT manage endpoints from purchase to retirement, with different tools and processes supporting devices at different stages. Continue Reading
-
Tip
09 Jan 2023
How does Android 13 work profile improve IT management
When users bring personal Android devices to the workplace, IT should consider using work profiles on these devices. Learn about the latest work profile features on Android 13. Continue Reading
-
Tip
12 Dec 2022
5 MDM features and platforms for small businesses
When SMBs deploy mobile devices, they need to find a viable MDM that can meet their needs. Read about 5 key features to look for in an MDM and some strong choices for vendors. Continue Reading
-
Tip
07 Dec 2022
How small businesses can pick the right mobile devices
To cash-strapped SMBs, deploying mobile devices may seem excessive. However, mobile devices are valuable tools to increase communication and productivity for business users. Continue Reading
-
News
30 Sep 2022
Jamf Q&A: How simplified BYOD enrollment helps IT and users
Jamf executives at JNUC 2022 share their vision of the future with simplified BYOD enrollment and the role iPhones have in the enterprise. Continue Reading
-
News
27 Sep 2022
Jamf to acquire ZecOps to bolster iOS security
Jamf will pay an undisclosed sum for ZecOps, which logs activity on iOS devices to find potential attacks. The companies expect the deal to close by 2023. Continue Reading
-
Feature
29 Aug 2022
Guide to developing social media recruiting strategies
To navigate the complexities and avoid the pitfalls of social media recruiting, companies must set goals, choose the right platforms, promote their culture and measure results. Continue Reading
-
Tip
27 Jul 2022
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises. Continue Reading
-
Tip
13 Jul 2022
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace. Continue Reading
-
Tip
28 Jun 2022
How to perform a full remote wipe on an iPhone
A remote wipe is a vital security tool as mobile devices become more common in the workplace. In organizations allowing work data on iPhones, IT should know the iOS wipe options. Continue Reading
-
Tip
14 Jun 2022
How to perform a remote wipe of Office 365 on a smartphone
Employees like having email and other Office 365 applications on their smartphones. There are security risks that come with mobile devices accessing corporate data, however. Continue Reading
-
Feature
16 May 2022
5G NSA vs. SA: How does each deployment mode differ?
Non-standalone 5G uses a combination of existing 4G LTE architecture with a 5G RAN. Standalone 5G, on the other hand, uses a 5G RAN and a cloud-native 5G core. Continue Reading
-
Tip
23 Mar 2022
How to evaluate mobile application management software
Finding the right mobile application management tool is about its features and what the organization needs to efficiently use them. Continue Reading
-
News
04 Mar 2022
HP brings device management to VR headsets
HP's SaaS product lets businesses using HTC and Pico virtual reality headsets track device locations, push application updates, patch devices and set security policies. Continue Reading
-
Tip
03 Mar 2022
What can organizations do to address BYOD privacy concerns?
BYOD conveniently puts work and personal data on one device, but this creates privacy concerns. Organizations should take steps to ensure both employee privacy and device security. Continue Reading
-
Tip
03 Mar 2022
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading
-
Tip
23 Feb 2022
A guide to enrolling Apple devices in Jamf
Organizations should consider management platforms from specialized vendors, such as Jamf, for specific OSes including Apple iOS. Learn how to enroll Apple devices into Jamf here. Continue Reading
-
News
13 Jan 2022
John Deere enters future of farming with autonomous tractor
The farm gear manufacturer will release a self-driving 8R model as farmers struggle to find labor and seek equipment for more efficient farming to maximize yield. Continue Reading
-
News
18 Nov 2021
Apple launches SMB device management
Designed for companies of up to 500 employees, Business Essentials offers tools to download apps and push updates to iPhones, iPads and Macs. It provides up to 2 TB iCloud storage. Continue Reading
-
News
01 Oct 2021
Apple improves MDM on iOS, iPad OS
Changes to Apple's mobile device management protocol could lead to better MDM products for iPhones and iPads. The protocol update is in iOS 15 and iPad OS 15. Continue Reading
-
Feature
22 Sep 2021
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also overlap. Knowing their differences is important. Continue Reading
-
Tip
09 Sep 2021
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a standalone MAM tool over an integrated EMM suite. Continue Reading
-
Tip
23 Aug 2021
How Intune fits into the Microsoft Endpoint Manager console
The Microsoft Endpoint Manager platform provides organizations with a centralized console for numerous Microsoft services, and IT admins should learn how Intune fits into this. Continue Reading
-
Answer
12 Jul 2021
How to integrate mobile threat defense and UEM such as Intune
Mobile admins can use mobile threat defense integrations with UEM to provide deeper visibility into the threat level of mobile devices and additional security controls. Continue Reading
-
News
08 Jul 2021
Mosyle adds screen sharing to MDM software
Mosyle's Screen View establishes a peer-to-peer connection for screen sharing between IT support staff and people with Apple devices. The new tool is in the Mosyle Admin Portal. Continue Reading
-
News
03 Jun 2021
Jamf makes sharing Apple devices easier
The endpoint management company's new Single Login feature makes it easier for a company's employees to share iPhones and iPads. The feature requires a Pro license. Continue Reading
-
Feature
24 May 2021
The future of BYOD: Trends and predictions
As employees and corporations come to expect greater flexibility and mobility, BYODs are an important element in the successful planning and execution of the hybrid workplace. Continue Reading
-
Feature
07 May 2021
Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategy
BYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading
-
Tip
16 Apr 2021
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well. Continue Reading
-
Guest Post
07 Dec 2020
Evaluating top MDMs for Android and iOS
While most MDMs can handle both mobile OSes, IT professionals should be aware which platforms can handle Android or iOS better than others. Learn about these platforms below. Continue Reading
-
News
04 Dec 2020
Google launching basic Android device management
Google's Android Enterprise Essentials will let small businesses add necessary security to their Android devices without the complexity of more advanced management products. Continue Reading
-
Tip
30 Oct 2020
Manage mobile operating system updates with Intune
Mobile administrators should enforce certain platform version minimums through mobile OS update policies for their devices, and Intune has a broad feature set to support this task. Continue Reading
-
News
19 Jun 2020
Microsoft Authenticator for Android update adds options
This month's Microsoft Authenticator for Android update allows users to check their recent account activity and change passwords within the password management app. Continue Reading
-
Tip
08 Apr 2020
Create a mobile BYOD policy for the coronavirus pandemic
The COVID-19 pandemic is forcing organizations to support remote work whenever possible. Organization can follow a few key steps to enable productive remote work on mobile devices. Continue Reading
-
Report
03 Apr 2020
Guide to work-from-home tech, IT support during the pandemic
This guide provides information on remote technologies that IT teams can quickly deploy to support employees who must work from home to prevent the spread of COVID-19. Continue Reading
-
Tip
30 Mar 2020
7 enterprise policies that enhance mobile user experience
Mobile admins must prioritize the mobile user experience they provide on their mobile fleet by deploying policies such as IT approving app permissions and single sign-on. Continue Reading
-
Tip
20 Mar 2020
5 strategic steps to blunt mobile device security threats
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it. Continue Reading
-
News
04 Mar 2020
Enhanced BlackBerry Spark strives for zero-trust security
With a bolstered unified endpoint security layer, announced at last week's RSA Conference, BlackBerry Spark wants to bring zero-trust security to a broad swath of devices. Continue Reading
-
Opinion
04 Feb 2020
Infographic: When to use MDM, MAM, and other EMM techniques
A visual guide to how Android Enterprise, iOS MDM, and mobile threat defense apply to BYOD, COPE, embedded devices, and the extended enterprise. Continue Reading
-
Opinion
23 Jan 2020
BYOD and using MDM is still an important decision!
Yes, it’s been a long time since BYOD was the top buzzword in our industry, but that doesn’t mean we don’t have to worry about it anymore.! Continue Reading
-
Feature
22 Jan 2020
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
-
News
10 Jan 2020
5G connectivity won't be enterprise-ready in 2020
Despite hype and new device announcements, experts expect 5G will take time to catch on in the enterprise. The tech has potential, but not all the necessary factors are in place. Continue Reading
-
Tip
08 Jan 2020
8 MobileIron features that EMM admins should know
IT professionals should make the most of their EMM platform by learning the potentially overlooked features. MobileIron admins should learn about the following eight features. Continue Reading
-
Tip
03 Jan 2020
4 factors that should shape a BYOD mobile policy
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
-
Opinion
02 Jan 2020
From the notebook: EBF Onboarder for MDM migration
MDM migrations can be tricky, so EBF Migrator helps keep everything in sync. Continue Reading
-
Tip
04 Dec 2019
Evaluate Intune alternatives for mobility management
Intune stands out in the EMM market in part due to its incumbency as a PC management platform. IT must evaluate Intune compared to other EMM and UEM platforms' mobility controls. Continue Reading
-
Tip
11 Nov 2019
Deploy kiosk devices with the Managed Home Screen Android app
The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best Managed Home Screen Android management options. Continue Reading
-
Feature
04 Nov 2019
8 JNUC 2019 sessions that will help iOS admins
At JNUC 2019, Apple admins gather to discuss their management practices, issues and success stories. Mobile admins who manage iPhones should look into these sessions. Continue Reading
-
Tip
31 Oct 2019
Develop a strong smartphone policy for the enterprise
Organizations with managed mobile users need to develop a smartphone policy, on everything from data use to app installation, to ensure security and smooth business processes. Continue Reading
-
Opinion
15 Oct 2019
Why organizations of any size should consider IDaaS
The risks of poor identity management are well known. Identity-as-a-service offerings can solve many identity-management-related issues. For companies that haven't yet, now is the time to get started. Continue Reading
-
Opinion
08 Oct 2019
A quick look at the Exodus MDM migration tool
A bunch of former AirWatch folks built an MDM migration tool, which could be useful as companies contemplate EMM refreshes, update deployments, or go through organizational changes. Continue Reading
-
Opinion
07 Oct 2019
NIST offers mobility best practices guide based on COPE deployments
Mobility isn’t a new concept, but it can sometimes be difficult to know where to start if you don’t have a framework in place, which is where NIST guidelines come in. Continue Reading
-
Tip
23 Sep 2019
Intune mobile device management features for Android 10, iOS 13
The Intune mobile device management features that IT can deploy differ based on which mobile OS users run. The latest versions of iOS and Android add to the list of differences. Continue Reading
-
Feature
30 Aug 2019
Choose the right UEM platform with this in-depth roundup
UEM tools are essential to oversee the many endpoints that reside in companies today. Read this comprehensive roundup to learn more about the leading products on the market. Continue Reading
-
Feature
27 Aug 2019
Compare UEM software and must-have features
UEM tools are essential to manage and secure the varying endpoints within an IT environment. Explore the major features and functions to consider and the vendors that provide them. Continue Reading
-
Opinion
26 Aug 2019
Why BYOD management is a moving target
Mixing work and personal usage on one device is a fundamental challenge that technology can only do so much to solve. Decide how to handle BYOD, or if you can nix it altogether. Continue Reading
-
Guide
14 Aug 2019
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market. Continue Reading
-
Feature
08 Aug 2019
Clear up the confusion about end-user computing
Today's end-user computing industry is the culmination of a decade of changes in mobility, desktops, virtualization and more. Dive in to what really qualifies as EUC. Continue Reading
-
Opinion
01 Aug 2019
Why EMM is the key to any enterprise mobility strategy
Now is the time to start incorporating EMM into enterprise mobility strategies. Here's why EMM is important and how organizations can take advantage of its benefits. Continue Reading
-
Feature
31 Jul 2019
Make the case for UEM tools with these compelling uses
Unified endpoint management provides companies with a single platform to oversee multiple devices. Learn more about the cost, productivity and overall business benefits. Continue Reading
-
Opinion
29 Jul 2019
Mobility management systems evolve from MDM to EMM to UEM
Driven by the cloud, evolving mobile devices, unification and the need for better security, companies are vacating the premises and embracing unified endpoint management. Continue Reading
-
Tip
25 Jul 2019
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps. Continue Reading
-
Tip
19 Jul 2019
Apple and Google simplify BYOD management with new OSes
IT must weigh user privacy and endpoint security when it shapes its BYOD policies. Luckily, new features in iOS 13 and Android Q make this balance easier for IT to strike. Continue Reading
-
Feature
18 Jul 2019
Discover details on unified endpoint management
With the prevalence of mobile devices in the enterprise, companies need solid technology to manage them. UEM tools consolidate all endpoints together to ensure they are secure. Continue Reading
-
Feature
10 Jul 2019
Identity management strategy starts with people, not technology
Organizations have the tough job of creating an overarching view of identity inside and out of the company. One thing they should remember? Focus on people rather than technology. Continue Reading
-
Tip
01 Jul 2019
How to use Intune app protection without MDM enrollment
Intune app protection allows IT admins to control devices without enrolling them in an MDM or UEM platform. Here's what IT pros can do with the feature. Continue Reading
-
News
01 Jul 2019
IAM market evolves, but at a cost
At a recent security and identity conference, attendees discussed the IAM market in clear terms: Shiny new features might be cool, but practicality reigns. Continue Reading
-
Feature
28 Jun 2019
Identity access management at a crossroads
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems. Continue Reading
-
Feature
28 Jun 2019
Hybrid identity management could be a method to the madness
IT departments planning to undergo a hybrid cloud migration need to think through how they're going to provide flexible and secure identity and access management to employees. Continue Reading
-
News
19 Jun 2019
BlackBerry Enterprise Mobility Suite adds 5 new features
BlackBerry has upgraded its Enterprise Mobility Suite in an effort to connect business and consumer applications in a secure environment to enable instant collaboration. Continue Reading
-
Answer
16 May 2019
How can zero-touch enrollment help Android admins?
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can benefit from this method. Continue Reading
-
Quiz
15 Apr 2019
Mobile authentication best practices quiz for IT pros
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly. Continue Reading
-
Tip
15 Apr 2019
Considerations for choosing enterprise mobility tools
Mobile device management may be long gone, but IT pros still have many options to enroll, secure and manage their organization's fleet of mobile devices. Discover what the options are. Continue Reading
-
Feature
11 Apr 2019
As enterprise device choice grows, so should a CYOD strategy
It's been 11 years since the iPhone came to market, but IT admins are still struggling with CYOD strategies. One reason? Choose your own device is now choose your own devices. Continue Reading
-
Feature
05 Apr 2019
3 mobile device deployment questions IT pros should ask
IT pros should be aware of different considerations when choosing mobile devices. Here's a quick guide on what questions to ask about mobile device deployment plans. Continue Reading
-
Tip
29 Mar 2019
5 tips for iOS and Android kiosk device management
IT pros can deploy configurations for kiosk devices with mobile management tools, such as Microsoft Intune. Consider these tips to ensure kiosk devices function as intended. Continue Reading
-
Tip
28 Mar 2019
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading