Articles

65 results
of 7
April 10, 2018 by Jason Koestenblatt
Jason Koestenblatt
CIOs and CISOs can't overlook the growing BYOD and COPE environments as threat vectors in the enterprise.
Tags: GDPR | Enterprise Mobility | Mobile Security | EMM | UEM | mdm
March 28, 2018 by Jason Koestenblatt
Jason Koestenblatt
Does building and deploying applications for myriad devices and operating systems put an obstacle in mobile transformation?
Tags: Mobile Applications | mobile transformation | BYOD | Android | iOS | Eric Klein | VDC Research
February 27, 2018 by Jason Koestenblatt
Jason Koestenblatt
Smartphones are getting all the attention at Mobile World Congress, and for good reason.
Tags: MWC | mobile world congress | Samsung | nokia | Huawei | Enterprise Mobility | smartphone
February 23, 2018 by Jason Koestenblatt
Jason Koestenblatt
For the first time since records have been tracked, global smartphone sales saw a decline year-over-year. That may not be a bad thing for the enterprise.
Tags: Fast Facts | smartphones | Apple | Samsung | Enterprise Mobility
January 30, 2018 by Jason Koestenblatt
Jason Koestenblatt
What does 2018 have in store for enterprise mobility? Readers want to know where the space is headed and how it can be secured now.
Tags: AI | chatbots | BYOD | COPE | Enterprise Mobility | Mobile Security
January 26, 2018 by Jason Koestenblatt
Jason Koestenblatt
The three major categories of enterprise mobility are all growing, but one is slower to adopt than the others. Why?
Tags: Enterprise Mobility | tablets | wearables | smartphones | BYOD | COPE
January 9, 2018 by Jason Koestenblatt
Jason Koestenblatt
BYOD and COPE have their own benefits and challenges - so which fits the enterprise best?
Tags: BYOD | COPE | Enterprise Mobility | CCS Insight | Nick McQuire
December 22, 2017 by Jason Koestenblatt
Jason Koestenblatt
The forecasts show bring-your-own environments in SMBs and enterprise settings is still on the rise, and quickly.
Tags: BYOD | Mobile Security | COPE
October 30, 2017 by Jason Koestenblatt
Jason Koestenblatt
In abiding by each company's industry regulations, IT administrators can ensure secure messaging doesn't create an open door for hackers.
Tags: secure messaging | Compliance | Enterprise Mobility | Smishing
August 2, 2017 by Devyn Amara
Devyn Amara
As enterprises grapple with the right mobile approach, decision makers have to understand what will work best for their employees and fit best in their policies.
Tags:
65 results
of 7