IT Administration
Discover valuable insights and ideas, for planning, executing, and fine-tuning your mobile strategy.
Discover valuable insights and ideas, for planning, executing, and fine-tuning your mobile strategy.
There is a lot to consider when introducing an EMM system. In order for you to be able to put your new EMM system into operation in a structured and successful manner, we have five tips for you which, in our experience, have proven particularly effective in practice.
Companies that provide their employees with smartphones which are also used privately must be prepared for the fact that WhatsApp is likely to be installed on these devices. A violation of the GDPR is therefore almost inevitable. We will tell you the background and explain how you realize WhatsApp business use in accordance to GDPR.
In our new “Mobility Basics” series, we focus on various terms related to working with mobile devices. Today, we explain in a simple and understandable way what Mobile Device Management is, why it is useful and who needs it.
When users sideload apps, they invariably risk exposing their device to malware – or worse. In this article we explain how sideloading works and why companies can benefit from MDM.
Apple’s VPP (Volume Purchase Program) enables companies and educational institutions to centrally purchase a large number of app licenses for iOS and macOS devices. Once the right apps have been selected for mobile users, they should be rolled out to the iOS devices as quickly and as easily as possible. Apple’s VPP supports various distribution methods, for example using an MDM solution. We describe the different rollout options in detail here.
Companies that equip their employees with mobile devices should pay special attention to one aspect of the device lifecycle – the fact that smartphones or tablets are often lost without ever reappearing. This article will show you what to pay attention to when procuring hardware and implementing your MDM strategy, and how to protect data on the device.
IT security is a complex issue. With the ever-increasing use of mobile devices and new technologies required for digital transformation, traditional boundaries and their risks are becoming blurred. In this article, you’ll find three simple tips which can be quickly implemented, and which have a significant impact on closing security gaps for any sized business.
There are several reasons why companies don’t use an MDM system. What is certainly not a reason, is that employees don’t use mobile devices. Most employees also work mobile even if only to use e-mail or Wi-Fi, whether a mobile strategy is in place or not.
The ABC of MDM: With these 10 MDM features you are fully equipped to manage mobile devices like a pro and you are guaranteed success.
With the latest iOS update to version 11.3, Apple has not only ensured further stability, but also gotten around to some long overdue homework. Just in time for the EU’s General Data Protection Regulation, the company has managed to finally separate business and private contacts on iOS devices.
AppleWatch, Google Glass & Android Gear: Wearable computers, also known as just wearables, are the secret stars of the Internet of Things (IOT). Although the sales figures don’t quite meet manufacturers’ expectations, smartwatches and fitness trackers are the perfect entry into this segment thanks to their lower prices. As with the first smartphones, IT departments are now faced with the task of managing devices, in a corporate context such as the Apple Watch, Google Glass and Samsung Gear.
No administrator will integrate WhatsApp into a business container, even if today its already technically possible. WhatsApp could easily gain important information from the container. There is a way however, to use WhatsApp for companies – either you completely forget the container idea or limit it to just a few apps. You can also create a way of screening data from typical private apps, which are in general quite unsecure, so that date can securely enter the company.