Mobile Device Management (MDM)

Mobile Device Management (MDM) news, analysis, research, how-to, opinion, and video.

Cisco integration gives Samsung Knox users more options for secure connectivity

Under pressure from falling phone sales, Samsung continues to court CIOs

Blackphone super-secure communications app had serious flaw

A vulnerability in the bundled encrypted messaging app would have allowed attackers to execute malicious code on the device


bills

For BYOD, Money Changes Everything

You can't blame employees for wanting to be paid for using their personal phones and tablets for work. And it’s understandable that companies don't want to subsidize personal use. Who foots the bill for BYOD phones has turned into a...

byod frustration

BYOD Was a Tech Roller Coaster Ride in 2014

From the beginning, the Bring Your Own Device movement has been a nightmare for CIOs. And recently many workers – once excited by the concept – are wondering if it’s worth it. Here’s a look back at CIO.com’s year-long coverage of this...

blackberry classic marble final

BlackBerry Classic Review: A Killer Smartphone for Keyboard Lovers

The BlackBerry Classic is the best smartphone the company has ever released, according to CIO.com's Al Sacco. However, it's not going to lure away many iPhone or Android users, or significantly increase BlackBerry's market share. And...

shadows

How Marketing Is Tackling MDM in the Shadows

Tech vendors are targeting marketers and other business executives with products and services and selling them behind IT's back. This shadow or rogue tech trend has now made its way to mobile device management.

IBM fixes serious flaw in Endpoint Manager for mobile device management

The flaw can be exploited to execute arbitrary code on the management server

byod around the world globe mobile

Around the World With BYOD

More than half of employees across the global bring a mobile device to work. However, when you look at individual countries, the results vary wildly in terms of ownership and adoption -- surprisingly, some tech-loving countries are...

byod keyboard bring your own device mobile

BYOD Brings Corporate Contradictions

CIOs naturally want a BYOD policy in place to give them some level of control, but the reality is that employees will do whatever they want regardless of the policy.

Long-running Android botnet evolves, could pose threat to corporate networks

The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said

byod mobile smartphones tablets devices
Q&A

COPE Offers IT and Workers an Alternative to BYOD

Some CIOs are opting for a Company Owned, Personally Enabled approach to managing mobile devices in the enterprise. COPE creates a tricky scenario, however, because IT is asking employees to trust them to do the right thing with a...

How End-to-End MDM Leaves Rollins With One Less Pest to Control

With the help of enterprise mobility system provider DMI, pest control company Rollins has moved its enterprise mobility strategies beyond simply disabling lost devices to offering its 5,000 business users a broader set of services.

business intelligence

Business Intelligence Meets Mobility at eHarmony

As online dating site eHarmony has expanded its mobile presence, it has also made good use of its business intelligence platform. This provides better visibility into what mobile users are doing and what services are better off being...

Vulnerability Leaves iPhones Open to Fake App Attack

Attackers can replace legitimate apps with fake ones that access and steal personal information

HP's BYOD Service Protects Mobile Devices and PCs

HP Touchpoint Manager is for SMBs, with plans starting at $2 per month

angry peasants mob farmers pitchforks

Why Your Workers Hate BYOD

If CIOs and other IT leaders have any doubt that employees are down on BYOD, senior writer Tom Kaneshige clears up any confusion.

The iPhone WireLurker Malware - What You Need to Know

The malware is using new methods to target Apple users, but should you be worried?

Android ransomware 'Koler' turns into a worm, spreads via SMS

The Koler ransomware locks the device screen and displays fake messages from police agencies

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said

healthcare security hp

Medical Device Security Benchmarks Emerging

In recent weeks, the FDA and the Center for Internet Security have released guidance documents on medical device security. While there are no hard and fast recommendations, given the diverse types of devices and environments in which...

Load More