New & Notable
Get Started
Simplify mobile app development for the enterprise
Without the right resources, mobile app development can be challenging. Find out how to start the process and the best tools to streamline the app dev journey.
Evaluate
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security.
Evaluate
The ultimate guide to mobile device security in the workplace
Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT.
Manage
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with several ways to steal data. These threats -- from network spoofing to phishing texts -- endanger organizations as much as individuals.
Trending Topics
-
Mobile Application Strategy Problem Solve
8 mobile app development challenges for the enterprise
Despite the growth of mobile application development in the enterprise, developers must still navigate unique challenges to deliver apps to mobile users.
-
Operating Systems & Devices Get Started
How to use Managed Google Play with Microsoft Intune
IT teams can connect their Managed Google Play accounts to Intune to get the best of both management tools. Integrate the two for easier Android Enterprise enrollment and more.
-
Mobile Security Evaluate
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security.
-
Mobile Infrastructure Evaluate
Could the iPhone 15's USB-C port drive device consolidation?
With the coming of the new iPhone with the USB-C port, organizations might look at this new compatibility feature as the impetus for some changes to their device policies.
-
Mobile Management Evaluate
BYOD's outlook brightens in hybrid workplaces
As employees and organizations come to expect greater mobility, BYOD is an important consideration in the successful planning and execution of the remote and hybrid workplace.
-
Unified endpoint management Get Started
Creating a patch management policy: Step-by-step guide
A comprehensive patch management policy is insurance against security vulnerabilities and bugs in networked hardware and software that can disrupt your critical business processes.
Find Solutions For Your Project
-
Evaluate
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security.
-
The ultimate guide to mobile device security in the workplace
-
BYOD's outlook brightens in hybrid workplaces
-
Why should businesses use and accept Apple Pay?
-
-
Problem Solve
8 mobile app development challenges for the enterprise
Despite the growth of mobile application development in the enterprise, developers must still navigate unique challenges to deliver apps to mobile users.
-
How to set up Apple Pay for a business
-
How do personal hotspots work for remote work?
-
Does a hotspot work when a mobile device has no service?
-
-
Manage
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with several ways to steal data. These threats -- from network spoofing to phishing texts -- endanger organizations as much as individuals.
-
What fees come with accepting Apple Pay for businesses?
-
Improve mobile hotspot security in 5 steps
-
Why businesses should recycle enterprise devices
-
Mobile Computing Basics
-
Get Started
4G (fourth-generation wireless)
4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).
-
Get Started
GPRS (General Packet Radio Service)
GPRS (General Packet Radio Service) is a best-effort packet-switching protocol and standard for wireless and cellular network communication services.
-
Get Started
Simplify mobile app development for the enterprise
Without the right resources, mobile app development can be challenging. Find out how to start the process and the best tools to streamline the app dev journey.
Multimedia
-
News
View All -
Mobile operating systems and devices
Samsung seeks bigger role as a business mobile provider
Samsung's wide variety of mobile devices, partnerships with software makers and government-grade security are differentiators in the business market, analysts said.
-
Mobile management
Jamf Q&A: How simplified BYOD enrollment helps IT and users
Jamf executives at JNUC 2022 share their vision of the future with simplified BYOD enrollment and the role iPhones have in the enterprise.
-
Mobile security
Jamf to acquire ZecOps to bolster iOS security
Jamf will pay an undisclosed sum for ZecOps, which logs activity on iOS devices to find potential attacks. The companies expect the deal to close by 2023.