{"id":3910,"date":"2023-06-02T14:39:27","date_gmt":"2023-06-02T14:39:27","guid":{"rendered":"https:\/\/cortado-blog.local\/?page_id=3910"},"modified":"2023-08-22T15:05:56","modified_gmt":"2023-08-22T15:05:56","slug":"cortado-blog","status":"publish","type":"page","link":"https:\/\/blog.cortado.com\/en\/","title":{"rendered":"Cortado Blog"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull welcome has-base-color has-primary-background-color has-text-color has-background has-link-color wp-elements-40ac3ff6a4cb35a8cfbc08a61cb4d3ea has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-1 wp-block-group-is-layout-constrained\" id=\"banner-top\" style=\"margin-top:0px;padding-top:100px;padding-right:30px;padding-bottom:120px;padding-left:30px\">\n<h1 class=\"wp-block-heading has-text-align-center has-base-color has-text-color has-max-36-font-size\" id=\"h-welcome-to-the-cortado-blog\" style=\"margin-bottom:0px;letter-spacing:-0.5px\">Welcome to the Cortado Blog<i class=\"fa-solid fa-message-lines\"><\/i><\/h1>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:-0.5px\">The Cortado Blog is your guide on company-managed smartphones and tablets. Here you will find MDM insights, best practices as well as tips and tricks for the effective and secure use of smartphones and tablets in your organization.<\/p>\n\n\n<div style=\"margin-top:25px;\" class=\"wp-block-categories-dropdown wp-block-categories\"><label class=\"screen-reader-text\" for=\"wp-block-categories-1\">Categories<\/label><select  name='cat' id='wp-block-categories-1' class='postform'>\n\t<option value='-1'>Select Category<\/option>\n\t<option class=\"level-0\" value=\"26\">Company News<\/option>\n\t<option class=\"level-0\" value=\"28\">IT Administration<\/option>\n\t<option class=\"level-0\" value=\"32\">Product News &amp; Insights<\/option>\n\t<option class=\"level-0\" value=\"34\">Technology &amp; Industry News<\/option>\n\t<option class=\"level-0\" value=\"36\">Tips &amp; Tricks for Mobile Work<\/option>\n\t<option class=\"level-0\" value=\"378\">All about company cell phones<\/option>\n\t<option class=\"level-0\" value=\"431\">Tipps &amp; Tricks f\u00fcr mobiles Arbeiten<\/option>\n\t<option class=\"level-0\" value=\"437\">Mobile Management \u2013 Hands-On<\/option>\n\t<option class=\"level-0\" value=\"440\">Mobile Strategies &amp; Work Models<\/option>\n<\/select><script>\n\t\n\t( function() {\n\t\tvar dropdown = document.getElementById( 'wp-block-categories-1' );\n\t\tfunction onCatChange() {\n\t\t\tif ( dropdown.options[ dropdown.selectedIndex ].value > 0 ) {\n\t\t\t\tlocation.href = \"https:\/\/blog.cortado.com\/en\/\/?cat=\" + dropdown.options[ dropdown.selectedIndex ].value;\n\t\t\t}\n\t\t}\n\t\tdropdown.onchange = onCatChange;\n\t})();\n\t\n\t\n<\/script>\n\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-neutral-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"posts\" style=\"margin-top:0;padding-top:var(--wp--preset--spacing--medium);padding-bottom:var(--wp--preset--spacing--medium)\">\n<div class=\"wp-block-group alignwide has-neutral-background-color has-background is-layout-flow wp-container-core-group-is-layout-35 wp-block-group-is-layout-flow\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-query grid-view has-global-padding is-content-justification-center is-layout-constrained wp-container-core-query-is-layout-1 wp-block-query-is-layout-constrained\"><ul class=\"is-flex-container columns-3 grid-item wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-6436 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on category-mobiles-arbeiten-2 category-mobile-work\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-4 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/the-apple-macbook-neo-in-enterprise-use-performance-design-and-security-with-cortado-mdm\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"2378\" height=\"1338\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"The Apple MacBook Neo in Enterprise Use: Performance, Design, and Security with Cortado MDM\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo.png 2378w, https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo-768x432.png 768w, https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo-1536x864.png 1536w, https:\/\/blog.cortado.com\/wp-content\/uploads\/MacBook-Neo-2048x1152.png 2048w\" sizes=\"(max-width: 2378px) 100vw, 2378px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-3 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2026-03-11T13:18:46+00:00\">March 11, 2026<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Simone Fulton<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobiles-arbeiten-2\/\" rel=\"tag\">Tipps &amp; Tricks f\u00fcr mobiles Arbeiten<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-work\/\" rel=\"tag\">Tips &amp; Tricks for Mobile Work<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/the-apple-macbook-neo-in-enterprise-use-performance-design-and-security-with-cortado-mdm\/\" target=\"_self\" >The Apple MacBook Neo in Enterprise Use: Performance, Design, and Security with Cortado MDM<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Apple is taking a bold step into the budget laptop market with the MacBook Neo &#8211; creating an intriguing option for businesses. But which version is truly suitable for professional use? And how can the device be efficiently integrated into existing IT infrastructures? Apple Enters New Territory With the MacBook Neo, Apple has introduced a&hellip;<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/the-apple-macbook-neo-in-enterprise-use-performance-design-and-security-with-cortado-mdm\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6415 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on tag-android-management\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-7 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Android Backdoor Malware: What Admins Must Check Now\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image.png 1536w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image-300x200.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image-1024x683.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Firmware-Backdoor-\u2013-Blog-Image-768x512.png 768w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-6 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-5 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2026-02-27T08:21:01+00:00\">February 27, 2026<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\" target=\"_self\" >Android Backdoor Malware: What Admins Must Check Now<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Backdoor-Malware wie Keenadu stellen ein erhebliches Sicherheitsrisiko f\u00fcr Unternehmensdaten dar. Erfahren Sie, wie IT-Admins kompromittierte Ger\u00e4te erkennen und mit Mobile Device Management effektiv absichern.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/android-backdoor-malware-what-admins-must-check\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6409 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-10 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/ios-business-container\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1376\" height=\"768\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/ios_business_container_png.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"iOS Business Container: Securely Separating Corporate Data on iPhone\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/ios_business_container_png.png 1376w, https:\/\/blog.cortado.com\/wp-content\/uploads\/ios_business_container_png-300x167.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/ios_business_container_png-1024x572.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/ios_business_container_png-768x429.png 768w\" sizes=\"(max-width: 1376px) 100vw, 1376px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-9 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-8 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2026-02-02T13:46:55+00:00\">February 2, 2026<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/ios-business-container\/\" target=\"_self\" >iOS Business Container: Securely Separating Corporate Data on iPhone<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">How organizations separate personal and corporate iPhone use: implement an iOS business container with MDM\u2014securely, practically, and GDPR-compliant.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/ios-business-container\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6374 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on tag-hybrid-work\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-13 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/hybrid-work-mdm-best-practices\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Hybrid-Work-MDM-Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Mobile Device Management for Hybrid Work Models: Benefits &amp; Best Practices\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Hybrid-Work-MDM-Blog.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Hybrid-Work-MDM-Blog-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Hybrid-Work-MDM-Blog-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Hybrid-Work-MDM-Blog-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-12 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-11 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2026-01-09T09:24:09+00:00\">January 9, 2026<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/hybrid-work-mdm-best-practices\/\" target=\"_self\" >Mobile Device Management for Hybrid Work Models: Benefits &amp; Best Practices<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A practical guide to Mobile Device Management in hybrid work environments. Security, compliance, and best practices for IT decision-makers.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/hybrid-work-mdm-best-practices\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6373 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-16 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/it-plan-2026-mobile-device-status-check\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Blog-Mobilgeraeteinspektion-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"IT Plan 2026: Why a Mobile Device Status Check Belongs on Every IT Agenda\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Blog-Mobilgeraeteinspektion-1.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Blog-Mobilgeraeteinspektion-1-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Blog-Mobilgeraeteinspektion-1-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Blog-Mobilgeraeteinspektion-1-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-15 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-14 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2026-01-08T08:17:56+00:00\">January 8, 2026<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/it-plan-2026-mobile-device-status-check\/\" target=\"_self\" >IT Plan 2026: Why a Mobile Device Status Check Belongs on Every IT Agenda<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Mobile devices are business-critical. A structured status check creates transparency for IT planning, budgeting, and priority setting for 2026.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/it-plan-2026-mobile-device-status-check\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6376 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-19 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/create-mobile-security-policy\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Mobile-Sicherheitsrichtlinie-erstellen-\u2013-Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"How to Create a Mobile Security Policy: The Ultimate Guide for Enterprises\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Mobile-Sicherheitsrichtlinie-erstellen-\u2013-Blog.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Mobile-Sicherheitsrichtlinie-erstellen-\u2013-Blog-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Mobile-Sicherheitsrichtlinie-erstellen-\u2013-Blog-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Mobile-Sicherheitsrichtlinie-erstellen-\u2013-Blog-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-18 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-17 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2025-12-18T12:20:48+00:00\">December 18, 2025<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/create-mobile-security-policy\/\" target=\"_self\" >How to Create a Mobile Security Policy: The Ultimate Guide for Enterprises<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A practical guide to creating a mobile security policy for enterprises. Covers BYOD, GDPR, MDM, and best practices for secure mobile work.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/create-mobile-security-policy\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6325 post type-post status-publish format-standard has-post-thumbnail hentry category-all-about-company-cell-phones\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-22 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/migrate-to-cortado-2\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1344\" height=\"768\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/freepik__the-referenced-logo-in-3d-and-some-modern-mobile-d__82718.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Apple MDM Migration: Why Now Is the Perfect Time to Switch to Cortado\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/freepik__the-referenced-logo-in-3d-and-some-modern-mobile-d__82718.png 1344w, https:\/\/blog.cortado.com\/wp-content\/uploads\/freepik__the-referenced-logo-in-3d-and-some-modern-mobile-d__82718-300x171.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/freepik__the-referenced-logo-in-3d-and-some-modern-mobile-d__82718-1024x585.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/freepik__the-referenced-logo-in-3d-and-some-modern-mobile-d__82718-768x439.png 768w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-21 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-20 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2025-11-20T10:14:17+00:00\">November 20, 2025<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Michael R\u00f6diger<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/all-about-company-cell-phones\/\" rel=\"tag\">All about company cell phones<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/migrate-to-cortado-2\/\" target=\"_self\" >Apple MDM Migration: Why Now Is the Perfect Time to Switch to Cortado<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">No More Complex MDM Transitions: Apple Enables Migration to cortado MDM Without Resetting Devices \u2013 Secure, Fast, and Without Data Loss.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/migrate-to-cortado-2\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6317 post type-post status-publish format-standard has-post-thumbnail hentry category-mobile-management-hands-on tag-apple-management-2\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-25 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/mac-management-guide\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Mac-Management-Leitfaden-\u2013-Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Mac Management: The Ultimate Guide for IT Administrators\u00a0\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Mac-Management-Leitfaden-\u2013-Blog.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Mac-Management-Leitfaden-\u2013-Blog-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Mac-Management-Leitfaden-\u2013-Blog-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Mac-Management-Leitfaden-\u2013-Blog-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-24 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-23 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2025-11-05T10:30:09+00:00\">November 5, 2025<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Maximilian Bauer<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/mobile-management-hands-on\/\" rel=\"tag\">Mobile Management \u2013 Hands-On<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/mac-management-guide\/\" target=\"_self\" >Mac Management: The Ultimate Guide for IT Administrators\u00a0<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The management of Mac devices has become a strategic IT priority. Discover how modern MDM tools, automation and Apple services make device management more efficient and secure than ever \u2013 from deployment right through to decommissioning. The management of Mac devices in corporations has evolved in recent years from a niche task to a strategic&hellip;<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/mac-management-guide\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6290 post type-post status-publish format-standard has-post-thumbnail hentry category-it-administration tag-enterprise-mdm-2\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-28 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-security-best-practices\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Security-01.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Enterprise MDM Security: Best Practices for Securing Large Device Fleets\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Security-01.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Security-01-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Security-01-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Security-01-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-27 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-26 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2025-08-21T09:53:32+00:00\">August 21, 2025<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/it-administration\/\" rel=\"tag\">IT Administration<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-security-best-practices\/\" target=\"_self\" >Enterprise MDM Security: Best Practices for Securing Large Device Fleets<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Discover the five key security areas for protecting large mobile device fleets \u2013 including practical tips for maximum security and compliance.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-security-best-practices\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6257 post type-post status-publish format-standard has-post-thumbnail hentry category-it-administration tag-enterprise-mdm-2\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-31 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-rollout-plan\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Rollout-Phases.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"The 11-Step Plan for Successful MDM Rollouts in Large Enterprises\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Rollout-Phases.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Rollout-Phases-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Rollout-Phases-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Rollout-Phases-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-30 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-29 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2025-08-15T10:34:05+00:00\">August 15, 2025<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/it-administration\/\" rel=\"tag\">IT Administration<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-rollout-plan\/\" target=\"_self\" >The 11-Step Plan for Successful MDM Rollouts in Large Enterprises<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Our 11-step plan gives you the essential know-how to successfully roll out Mobile Device Management in large enterprise environments \u2013 including a hands-on guide available for download.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-rollout-plan\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-6255 post type-post status-publish format-standard has-post-thumbnail hentry category-it-administration tag-enterprise-mdm-2\">\n\n<div class=\"wp-block-group box-bg has-border-color has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-34 wp-block-group-is-layout-constrained\" style=\"border-color:#21242c1a;border-width:1px;border-radius:10px;padding-top:var(--wp--preset--spacing--x-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\"><figure style=\"height:200px;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-challenges\/\" target=\"_self\"  style=\"height:200px\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Challenges-02.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Enterprise MDM: The biggest challenges of managing large device fleets \u2013 and how Cortado solves them\" style=\"height:200px;object-fit:cover;\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Challenges-02.png 1200w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Challenges-02-300x169.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Challenges-02-1024x576.png 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Enterprise-MDM-Challenges-02-768x432.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-33 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--x-small);padding-bottom:0;padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-32 wp-block-group-is-layout-flex\"><div style=\"font-size:13px;\" class=\"wp-block-post-date\"><time datetime=\"2025-08-14T07:54:23+00:00\">August 14, 2025<\/time><\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px;text-transform:capitalize;\" class=\"wp-block-post-author-name\">Linda Martin<\/div>\n\n\n<p style=\"font-size:12px\">\u2014<\/p>\n\n\n<div style=\"font-size:13px\" class=\"taxonomy-category has-link-color wp-elements-cf1a98b4b8d87a2ec0dd708c110adbbe wp-block-post-terms\"><a href=\"https:\/\/blog.cortado.com\/en\/category\/it-administration\/\" rel=\"tag\">IT Administration<\/a><\/div><\/div>\n\n\n<h2 style=\"margin-top:10px;\" class=\"has-link-color wp-elements-fbaeee1caec39c03c20e6b06fd05653d wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-challenges\/\" target=\"_self\" >Enterprise MDM: The biggest challenges of managing large device fleets \u2013 and how Cortado solves them<\/a><\/h2>\n\n<div style=\"margin-top:10px;margin-right:0;margin-bottom:var(--wp--preset--spacing--x-small);margin-left:0;\" class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">When a company isn&#8217;t just managing a few hundred but thousands or even tens of thousands of smartphones and tablets, mobile device management becomes a serious discipline.<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/blog.cortado.com\/en\/enterprise-mdm-challenges\/\">Read More<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><\/ul>\n\n<nav class=\"wp-block-query-pagination is-horizontal is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-query-pagination-is-layout-1 wp-block-query-pagination-is-layout-flex\" aria-label=\"Pagination\">\n\n\n<div class=\"wp-block-query-pagination-numbers\"><span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"?query-1-page=2\">2<\/a>\n<a class=\"page-numbers\" href=\"?query-1-page=3\">3<\/a>\n<span class=\"page-numbers dots\">&hellip;<\/span>\n<a class=\"page-numbers\" href=\"?query-1-page=17\">17<\/a><\/div>\n\n<a href=\"\/en\/wp-json\/wp\/v2\/pages\/3910?query-1-page=2\" class=\"wp-block-query-pagination-next\">Next Page<span class='wp-block-query-pagination-next-arrow is-arrow-arrow' aria-hidden='true'>\u2192<\/span><\/a>\n<\/nav>\n\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the Cortado Blog The Cortado Blog is your guide on company-managed smartphones and tablets. Here you will find MDM insights, best practices as well as tips and tricks for the effective and secure use of smartphones and tablets in your organization.<\/p>\n","protected":false},"author":18,"featured_media":4375,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"no-title","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3910","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cortado Blog | Insights on Company Smartphones<\/title>\n<meta name=\"description\" content=\"News, strategies, best practices and tips on the effective, secure deployment of smartphones and tablets in the workplace. Discover now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cortado.com\/en\/\" \/>\n<link rel=\"next\" href=\"https:\/\/blog.cortado.com\/en\/3910\/?query-1-page=2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cortado Blog\" \/>\n<meta property=\"og:description\" content=\"News, strategies, best practices and tips on the effective, secure deployment of smartphones and tablets in the workplace. Discover now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cortado.com\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"Cortado Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-22T15:05:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.cortado.com\/en\/\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog | Insights on Company Smartphones\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png\",\"datePublished\":\"2023-06-02T14:39:27+00:00\",\"dateModified\":\"2023-08-22T15:05:56+00:00\",\"description\":\"News, strategies, best practices and tips on the effective, secure deployment of smartphones and tablets in the workplace. Discover now!\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.cortado.com\/en\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#primaryimage\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png\",\"width\":1600,\"height\":1000,\"caption\":\"Cortado Blog Logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.cortado.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cortado Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog\",\"description\":\"News from Cortado\",\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.cortado.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\",\"name\":\"Cortado Blog\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"width\":226,\"height\":32,\"caption\":\"Cortado Blog\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cortado Blog | Insights on Company Smartphones","description":"News, strategies, best practices and tips on the effective, secure deployment of smartphones and tablets in the workplace. Discover now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cortado.com\/en\/","next":"https:\/\/blog.cortado.com\/en\/3910?query-1-page=2","og_locale":"en_US","og_type":"article","og_title":"Cortado Blog","og_description":"News, strategies, best practices and tips on the effective, secure deployment of smartphones and tablets in the workplace. Discover now!","og_url":"https:\/\/blog.cortado.com\/en\/","og_site_name":"Cortado Blog","article_modified_time":"2023-08-22T15:05:56+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.cortado.com\/en\/","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog | Insights on Company Smartphones","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/#primaryimage"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png","datePublished":"2023-06-02T14:39:27+00:00","dateModified":"2023-08-22T15:05:56+00:00","description":"News, strategies, best practices and tips on the effective, secure deployment of smartphones and tablets in the workplace. Discover now!","breadcrumb":{"@id":"https:\/\/blog.cortado.com\/en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cortado.com\/en\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#primaryimage","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-fi.png","width":1600,"height":1000,"caption":"Cortado Blog Logo"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cortado.com\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cortado.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cortado Blog"}]},{"@type":"WebSite","@id":"https:\/\/blog.cortado.com\/en\/#website","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog","description":"News from Cortado","publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cortado.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cortado.com\/en\/#organization","name":"Cortado Blog","url":"https:\/\/blog.cortado.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","width":226,"height":32,"caption":"Cortado Blog"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/pages\/3910"}],"collection":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/comments?post=3910"}],"version-history":[{"count":0,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/pages\/3910\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media\/4375"}],"wp:attachment":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media?parent=3910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}