IT Administration

Ideas, inspiration and best-practice examples for the effective planning, implementation and optimization of your mobile strategy.

Managing Devices with Apple Business Manager

In this article we provide an overview of Apple Business Manager and give a few tips that will help you to get started with the portal.

Say No to Complexity: Choosing a Simple MDM for Android and iOS

In this blog post, we explain why an uncomplicated, simple MDM for Android and iOS is the best way is to effectively meet businesses’ digital requirements.

Android Smartphone User

Android Zero-Touch Enrollment: This Is How Contactless Deployment of Android Devices Works in the Enterprise

Android Zero-Touch enrollment provides an easy, quick and secure way to set up and deploy Android-based enterprise devices. In this article we explain what the advantages and requirements are and how the registration works.

Datenschutz neu denken: Hat Ihr Unternehmen mit der Umsetzung der Datenschutz-Grundverordnung begonnen?

GDPR Compliance Checklist: These Two Fines Show Why It’s Time to Act

It’s a fitting time to ask: Has your company established GDPR compliance? In just the space of a few days, the Information Commissioner's Office (ICO) has given European businesses two alarming reminders of the importance of GDPR compliance. Read on to find out what action you need to take to protect your organization from a GDPR penalty.

iOS updates should be delayed in companies until it is certain that all important applications are working.

No Rush – Why Companies Should Delay Apple iOS Updates

iOS updates offer plenty of new possibilities for iPhones and iPads and are often eagerly awaited. So, it’s hardly surprising that some users want to install the latest updates on their devices immediately. But companies need to be careful. In our blog post, you’ll find out why it’s recommended to delay iOS updates on managed devices and how you can make sure that updates don’t occur until your organization is ready.

What is the difference between BYOD and COBO?

Mobility Basics Part III: What’s the Difference Between BYOD and COBO?

Once organizations have decided to allow their employees to work on the go, the question arises of HOW. Are employees to be allowed to use their own devices, or should company-owned devices be purchased? We look at both options and explain the difference between the BYOD and COBO concepts.

What is Mobile Application Management

Mobility Basics Part II: What exactly is… Mobile Application Management (MAM)?

In the first part of our series "Mobility Basics" we explained what MDM is. Today we're talking about Mobile Application Management (MAM).

Thin ice: WhatsApp on company devices

WhatsApp business use in accordance with GDPR

Companies that provide their employees with smartphones which are also used privately must be prepared for the fact that WhatsApp is likely to be installed on these devices. A violation of the GDPR is therefore almost inevitable. We will tell you the background and explain how you realize WhatsApp business use in accordance to GDPR.

What is Apple VPP (Volume Purchase Program)?

What is Apple VPP (Volume Purchase Program)?

Apple’s VPP (Volume Purchase Program) enables companies and educational institutions to centrally purchase a large number of app licenses for iOS and macOS devices. Once the right apps have been selected for mobile users, they should be rolled out to the iOS devices as quickly and as easily as possible. Apple’s VPP supports various distribution methods, for example using an MDM solution. We describe the different rollout options in detail here.

Android Smartphone in Lost Mode

Tips for Your MDM Concept: How to Maintain Data Security When Mobile Devices Are Lost

Companies that equip their employees with mobile devices should pay special attention to one aspect of the device lifecycle – the fact that smartphones or tablets are often lost without ever reappearing. This article will show you what to pay attention to when procuring hardware and implementing your MDM strategy, and how to protect data on the device.