Editors' Picks
-
IT admins prepared for Apple's new iPhone 5 deluge
Enterprise IT is ready to support Apple's new iPhones, which are sure to make their way into companies as employees buy the devices this month.12 Sep 2013
-
Quiz: Seven questions on Apple iOS 7 features
In Apple iOS 7, there are management and security improvements to appease IT, plus some user-focused features that admins may have to worry about.06 Sep 2013
-
Location data finds a home in mobile business intelligence apps
The combination of location intelligence and mobile BI tools can help users take analytics into the field, but there are challenges to be aware of.30 Aug 2013
-
How to configure CA certificates for iPad and iPhone
Apple iPads and iPhones can connect securely to enterprise networks, but IT admins need to add CA certificates to the devices first.14 Aug 2013
-
What do you know about dual-persona technology?
Dual persona is fairly new, so you may not be familiar with it yet. Take our quiz to see how much you know -- and learn more -- about the technology.12 Aug 2013
-
The state of mobile device backup
With the growing bring-your-own-device movement, backing up data on mobile devices is quickly becoming an issue for most companies.02 Aug 2013
-
IT insourcing vs. outsourcing: Readers debate selective outsourcing
In this CIO Chatter, our readers respond to a recent column on IT insourcing vs. outsourcing. What are your views in the selective-outsourcing debate?11 Jul 2013
-
Introduction to iPad administration
You can use Apple Configurator and over-the-air methods to send configuration profiles to iPads, giving you more control over iPad administration.13 Jun 2013
-
Tackling iOS device management with Apple Configurator
Apple Configurator simplifies iOS device management and configuration and makes it easier for admins to prepare and supervise devices.05 Jun 2013
-
IPhone vs. Android backup
Eric Slack of Storage Switzerland compares iPhone and Android backup in this Expert Answer.30 May 2013
-
Making mobile BI applications a reality: Key steps to take
In a podcast, BI expert William McKnight discusses best practices and action items for managing deployments of mobile business intelligence tools.03 May 2013
-
As BI mobility takes off, don't get left behind -- or unprepared
Deployments of mobile business intelligence tools are spreading rapidly. Before you take the mobile BI plunge, read advice on how to make it work.18 Apr 2013
-
Mobile business intelligence applications: Not just a pretty interface
Back-end factors such as network performance and server hardware are key elements of building an effective mobile business intelligence architecture.08 Mar 2013
-
Growing use of mobile BI apps sparks need to downsize designs
Mobile business intelligence adds new challenges for BI teams, especially in designing apps. Don't overdo it on data, say BI managers and analysts.08 Mar 2013
-
Apple VPP makes it easier to buy iOS business apps
The Apple Volume Purchasing Program lets organizations buy public iOS business apps for employees who use iPhones and iPads for work.22 Feb 2013
-
Mitigations for mobile phishing problems on the iOS platform
With potential phishing problems surfacing for iOS users, expert Nick Lewis provides advice for enterprises facing the mobile phishing menace.18 Feb 2013
-
Security, data usage policies must-haves for mobile app management
Making corporate data available on mobile devices calls for careful management to keep business users from going down wrong paths in using the info.15 Feb 2013
-
McGraw's mobile app security strategy: Three legs of 'trusted on busted'
Struggling to define your mobile app security strategy? Gary McGraw offers a manifesto to help get infosec and app developers on the same page.13 Feb 2013
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak.12 Feb 2013
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.28 Jan 2013
Security Management Strategies for the CIO