Mobile Management

Mobile Management | News, how-tos, features, reviews, and videos

iot security startups hot planets rocket lock security

15 hot tech skills getting hotter -- no certification required

Employers are apt to invest more often in cash premiums for noncertified tech skills compared to certifications. Here are a few they’re coveting the most now and going forward.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

A man using a mobile phone in shadow against a bright wall

Shadow IT goes home: How to reduce the risk

As workers were forced home due to the COVID-19 crisis, the potential for shadow IT went with them to their remote offices. However, it doesn't need pose a risk. In fact, it could prove to be an asset.

mobile security / unlocked data connections

Verizon: Companies will sacrifice mobile security for profitability, convenience

Although nearly seven-in-10 businesses suffered a mobile compromise – and called the impact “major” – nearly half continue to sacrifice security, according to a study by Verizon.

Cloud Computing - Unified Endpoint Management U[EM]

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.

IDG Tech Spotlight  >  Security  >  UEM/unified endpoint management and security

UEM to marry security — finally — after long courtship

Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.

iPhone security / unlocking, hacking or breaking into iPhone

Feds may already have found a way to hack into Apple iPhones

By refusing to put a permanent backdoor in its iOS platform, Apple wants to protect millions of users from future threats by both governments and hackers, privacy advocates said.

apple logo colors 01

JNUC 2019: For enterprise pros, it's like the old days of Apple events

Jamf has built a unique event that digs deep into the community it serves and echoes the big shows Apple used to put on.

mdm UEM

Microsoft combines Intune with ConfigMgr

Enterprises that have System Center Configuration Manager licenses now have automatic access to Intune via the new, combined Endpoint Manager.

Unified Endpoint Management

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

While C-level positions were all the rage when mobility was new in the enterprise, the role of CMO – while still somewhat prevalent – is now largely unnecessary and could even hurt your bottom line.

mdm byod binary mobile phone mobile device compliance

Survey: Half of U.S. workers face one or more serious mobile issues monthly

The survey showed a gap between the MDM and EMM tools and IT's ability to monitor mobile issues that could affect worker productivity.

FinTech - Mobile Banking - Unified Endpoint Management U[EM]

Q&A: How one college embraced UEM to manage endpoints at five campuses

Truckee Meadows Community College has more than 3,000 desktops, tablets and IoT devices that it manages through a single interface. But the journey to unified endpoint management wasn't simple – and it came with a few surprises.

mobile charging - low battery - phone charge

10 top tips for saving your smartphone’s battery

While we've come to depend on smartphones for much of our daily lives, too often we run apps, services or systems that unnecessarily hit battery life.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

ios13 hero 03

How to create a mobile policy for iOS devices

When developing a mobile policy for iPhones and iPads, it’s important to keep in mind that from an EMM perspective, Apple’s biggest goal ( beyond privacy) is delivering a single seamless iOS experience.

cloud

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

cloud
external url

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

google android pixel 3 smart phone purple

How to create a mobile policy for Android devices

Android has become a viable enterprise platform and in some ways is beating Apple in terms of enterprise functionality. This means that IT departments supporting Android devices need to create and implement effective policies.

CSO > Security automation

Microsoft delivers Defender ATP security service to Macs

Microsoft Defender ATP detects ongoing attacks on corporate networks, blocks those that are malicious, then provides response recommendations. It can be deployed to Macs using Microsoft Intune, JAMF or other MDM platforms.

Apple WWDC 2019

Apple eyes changes to iOS device management

At last week's developers conference, Apple rolled out a number of changes to the way iPhones, iPads and other devices are handled. Here's what those changes mean.

Load More