IT Administration
Discover valuable insights and ideas, for planning, executing, and fine-tuning your mobile strategy.
Discover valuable insights and ideas, for planning, executing, and fine-tuning your mobile strategy.
Android Zero-Touch enrollment provides an easy, quick and secure way to set up and deploy Android-based enterprise devices. In this article we explain what the advantages and requirements are and how the registration works.
It’s a fitting time to ask: Has your company established GDPR compliance? In just the space of a few days, the Information Commissioner’s Office (ICO) has given European businesses two alarming reminders of the importance of GDPR compliance. Read on to find out what action you need to take to protect your organization from a…
iOS updates offer plenty of new possibilities for iPhones and iPads and are often eagerly awaited. So, it’s hardly surprising that some users want to install the latest updates on their devices immediately. But companies need to be careful. In our blog post, you’ll find out why it’s recommended to delay iOS updates on managed…
Once organizations have decided to allow their employees to work on the go, the question arises of HOW. Are employees to be allowed to use their own devices, or should company-owned devices be purchased? We look at both options and explain the difference between the BYOD and COBO concepts.
In the first part of our series “Mobility Basics” we explained what MDM is. Today we’re talking about Mobile Application Management (MAM).
There is a lot to consider when introducing an EMM system. In order for you to be able to put your new EMM system into operation in a structured and successful manner, we have five tips for you which, in our experience, have proven particularly effective in practice.
Companies that provide their employees with smartphones which are also used privately must be prepared for the fact that WhatsApp is likely to be installed on these devices. A violation of the GDPR is therefore almost inevitable. We will tell you the background and explain how you realize WhatsApp business use in accordance to GDPR.
In our new “Mobility Basics” series, we focus on various terms related to working with mobile devices. Today, we explain in a simple and understandable way what Mobile Device Management is, why it is useful and who needs it.
When users sideload apps, they invariably risk exposing their device to malware – or worse. In this article we explain how sideloading works and why companies can benefit from MDM.
Apple’s VPP (Volume Purchase Program) enables companies and educational institutions to centrally purchase a large number of app licenses for iOS and macOS devices. Once the right apps have been selected for mobile users, they should be rolled out to the iOS devices as quickly and as easily as possible. Apple’s VPP supports various distribution…
Companies that equip their employees with mobile devices should pay special attention to one aspect of the device lifecycle – the fact that smartphones or tablets are often lost without ever reappearing. This article will show you what to pay attention to when procuring hardware and implementing your MDM strategy, and how to protect data…
IT security is a complex issue. With the ever-increasing use of mobile devices and new technologies required for digital transformation, traditional boundaries and their risks are becoming blurred. In this article, you’ll find three simple tips which can be quickly implemented, and which have a significant impact on closing security gaps for any sized business.