With the new version of AirWatch powered by Apple MDM, mobile management can control iOS 4 iPads, iPhones, and the apps allowed to run on them.
More articles by Lisa Phifer
To help with mobile device management during the holiday shopping season, we outline the top 10 smartphone security mistakes to safeguard against.
This comprehensive review highlights key features of AirWatch Enterprise Package, which helps mobile IT provision, track and enforce policies on iPhones, Android handsets and Windows Mobile devices.
Mobile security covers more than smartphones and laptops. We evaluate the Kanguru Remote Management Console Cloud Edition, an affordable way to protect data on thumb drives.
In this comprehensive review, CACE Pilot, which cuts large-volume traffic captures into smaller data sets for easier evaluation, is tested on wireless networks and LANs.
We highlight some of the best, free tools mobile management can use to evaluate Wi-Fi network security issues.
Rogue access points, data interception, DoS downtime -- these are all Wi-Fi threats that can spell trouble for mobile security managers. We outline our Top 10 Wi-Fi threats and offer guidance on how to protect against them.
Our reviewer takes this mobile network protection tool for a test drive to evaluate how well it safeguards enterprise wireless systems.
Mobile Internet devices took center stage at the Consumer Electronics Show this year, which means new security risks for enterprise IT. We offer 10 tips for countering against wireless vulnerabilities.
AirWave's new service lets mobile enterprise managers oversee wired and wireless network components in a centralized system.
AirTight, a firm specializing in Wireless Intrusion Prevention Systems, can help you protect your network if you're prepping for a Wi-Fi upgrade.
The HTC Hero boasts an innovative user interface, but there's even more to love in this Android-powered smartphone.
Does the Motorola Droid from Verizon Wireless live up to the hype? We highlight the pros and cons of this seminal Android-powered handset.
In addition to refreshing workstations and servers, IT pros must now also plan lifecycle refreshes for laptops, tablets, smartphones and other mobile devices. From increased productivity to compliance to support costs, discover what factors are driving those decisions. Also, download this report and learn which mobile initiatives IT organizations are investing in most aggressively.