Blog

Modern management of iOS 13

Apple has always valued user privacy above everything else. This manifests not only in their device’s interface design, the underlying principles of their operating systems but also in the way UEM / EMM vendors can apply management to their mobile devices. In any other scenario than fully corporate owned devices the user is able to remove corporate management profile at any moment. The user is also clearly informed what their IT administrator is capable on their device and if anything is not to their liking a simple click disables any control. iOS 13 is another big step towards providing the end user with more control over their device and more privacy.

(R)evolution of mobile device management. What Unified Endpoint Management actually means?

Do you remember phrases like OMA DM, SyncML or OMA CP? No? Take it easy! It’s been a long time since the foundation of the first Mobile Device Management systems (or some similar systems) appeared on the market. Since then a lot has changed, a lot of new protocols and many more systems have been made. Now, most of you have probably heard about shortcuts like MDM, EMM and the hottest and latest one – UEM. Mobile devices are part of our life and it is really hard to imagine working without these tools even if you are an employee of a nuclear power plant! Let me tell you a story…

Manage your mobile devices in a smart way. Enterprise mobility strategies explained

Mobile devices are essential tools for any modern business. As much as they facilitate employees’ work, they also provoke significant concerns regarding costs, applications compatibility and most importantly security of data.

What is Mobile Threat Defence?

These solutions can be treated as the next generation of anti-virus software for mobile devices. MTD is a set of tools which allow protection of the mobile device and applications against “advanced” threats. What are these advance threats? To put it simply – anything other than simple data theft once the device is lost or stolen, installing an unwanted application or eavesdropping the network traffic to and from the device.

This site uses cookies. By using this website you agree to the use of cookies in accordance with the settings of your browser. Learn more.

I accept