IT Administration

Discover valuable insights and ideas, for planning, executing, and fine-tuning your mobile strategy.

  • WhatsApp Business and GDPR: How to Use it Safely

    WhatsApp Business and GDPR: How to Use it Safely

    Companies that provide their employees with smartphones which are also used privately must be prepared for the fact that WhatsApp is likely to be installed on these devices. A violation of the GDPR is therefore almost inevitable. We will tell you the background and explain how you realize WhatsApp business use in accordance to GDPR.

    Read More

  • Mobility Basics Part I: What is Mobile Device Management (MDM)?

    Mobility Basics Part I: What is Mobile Device Management (MDM)?

    In our new “Mobility Basics” series, we focus on various terms related to working with mobile devices. Today, we explain in a simple and understandable way what Mobile Device Management is, why it is useful and who needs it.

    Read More

  • Sideloading apps for iOS and potential risks explained

    Sideloading apps for iOS and potential risks explained

    When users sideload apps, they invariably risk exposing their device to malware – or worse. In this article we explain how sideloading works and why companies can benefit from MDM.

    Read More

  • What is Apple VPP (Volume Purchase Program)?

    What is Apple VPP (Volume Purchase Program)?

    Apple’s VPP (Volume Purchase Program) enables companies and educational institutions to centrally purchase a large number of app licenses for iOS and macOS devices. Once the right apps have been selected for mobile users, they should be rolled out to the iOS devices as quickly and as easily as possible. Apple’s VPP supports various distribution methods, for example using an MDM solution. We describe the different rollout options in detail here.

    Read More

  • Tips for Your MDM Concept: How to Maintain Data Security When Mobile Devices Are Lost

    Tips for Your MDM Concept: How to Maintain Data Security When Mobile Devices Are Lost

    Companies that equip their employees with mobile devices should pay special attention to one aspect of the device lifecycle – the fact that smartphones or tablets are often lost without ever reappearing. This article will show you what to pay attention to when procuring hardware and implementing your MDM strategy, and how to protect data on the device.

    Read More

  • 3 Tips for Reduced Security Risks and Better Cyber Attack Prevention

    3 Tips for Reduced Security Risks and Better Cyber Attack Prevention

    IT security is a complex issue. With the ever-increasing use of mobile devices and new technologies required for digital transformation, traditional boundaries and their risks are becoming blurred. In this article, you’ll find three simple tips which can be quickly implemented, and which have a significant impact on closing security gaps for any sized business.

    Read More

  • How E-Mail and Wi-Fi Justify MDM

    How E-Mail and Wi-Fi Justify MDM

    There are several reasons why companies don’t use an MDM system. What is certainly not a reason, is that employees don’t use mobile devices. Most employees also work mobile even if only to use e-mail or Wi-Fi, whether a mobile strategy is in place or not.

    Read More

  • 10 MDM Features to Manage Devices like a Pro

    10 MDM Features to Manage Devices like a Pro

    The ABC of MDM: With these 10 MDM features you are fully equipped to manage mobile devices like a pro and you are guaranteed success.

    Read More

  • iOS: Ready for GDPR with Managed Contacts

    iOS: Ready for GDPR with Managed Contacts

    With the latest iOS update to version 11.3, Apple has not only ensured further stability, but also gotten around to some long overdue homework. Just in time for the EU’s General Data Protection Regulation, the company has managed to finally separate business and private contacts on iOS devices.

    Read More

  • Apple Watch, Google Glass & Samsung Gear: Wearables at Work?

    Apple Watch, Google Glass & Samsung Gear: Wearables at Work?

    AppleWatch, Google Glass & Android Gear: Wearable computers, also known as just wearables, are the secret stars of the Internet of Things (IOT). Although the sales figures don’t quite meet manufacturers’ expectations, smartwatches and fitness trackers are the perfect entry into this segment thanks to their lower prices. As with the first smartphones, IT departments are now faced with the task of managing devices, in a corporate context such as the Apple Watch, Google Glass and Samsung Gear.

    Read More

  • WhatsApp in a Business Container? Is it Even Possible?

    WhatsApp in a Business Container? Is it Even Possible?

    No administrator will integrate WhatsApp into a business container, even if today its already technically possible. WhatsApp could easily gain important information from the container. There is a way however, to use WhatsApp for companies – either you completely forget the container idea or limit it to just a few apps. You can also create a way of screening data from typical private apps, which are in general quite unsecure, so that date can securely enter the company.

    Read More

  • Do Phones Need Antivirus Protection?

    Do Phones Need Antivirus Protection?

    iPhones and Android smartphones can also be infected by viruses. How dangerous is this for companies? What protective measures can be taken?

    Read More