Blog | Endpoint Management

Are You Ready for the Future of Android Device Management?
Blog | Endpoint Management · 04. December 2023
The introduction of Android Enterprise with Android 5.0 (Lollipop) back in 2014, allowed enterprises and corporations to deploy, secure, and manage Android with various deployment scenarios, including Bring-Your-Own-Device (BYOD) and Corporate-Owned, Personal-Enabled (COPE) as well as Corporate-Owned, Business-Only (COBO) devices. 

Public Security Announcement: Ivanti EPMM Vulnerabilities
Blog | Endpoint Management · 08. August 2023
Two critical vulnerabilities were discovered last week, affecting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. EPMM is a Mobile Device Management (MDM) and Unified Endpoint Management (UEM) solution offered by Ivanti to help organizations manage and secure mobile devices, such as smartphones and tablets, as well as other endpoints like computers and servers, from a centralized platform.

IoT - Internet of Things
Blog | Endpoint Management · 01. June 2022
Cybersecurity is here to stay, and chances are you already have some tools to protect your network, users, and devices. Most organizations are already using a multitude of tools and solutions to manage and secure their entire mobile fleet, endpoints, and network, but are they making the most out of them? Your Security Posture is not about deploying all security solutions and turning all the switches on, but identifying the risks, assessing them accordingly and applying the solution to address...

Emergency Advisory: VMware Vulnerabilities
Blog | Endpoint Management · 19. May 2022
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive regarding vulnerabilities in VMware products. On Wednesday May 18th, VMware released an update for two identified vulnerabilities affecting the following products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager.

Demystifying Security: Conditional Access
Blog | Endpoint Management · 03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...

How to Control External Meeting Communications in MS Teams
Blog | Endpoint Management · 12. October 2021
Blocking sensitive company information from being released, and complying with requirements in business policies - while internal users attend a meeting held externally with persons from outside - their organization are two difficulties that organizations are currently experiencing.

Blog | Endpoint Management · 28. January 2016
BlackBerry, a global leader in secure mobile communications, today announced significant upgrades to its enterprise software portfolio, enhancing BES®12 – the comprehensive multi-OS EMM solution from BlackBerry – with integrated management capabilities for Good Dynamics and WatchDox® by BlackBerry. “These enterprise software portfolio upgrades support our customers by providing market-leading mobile security and enterprise productivity while reducing IT complexity and resources through...

Blog | Endpoint Management · 21. January 2016
AirWatch 8.2 takes us one step closer to our ultimate goal of unified endpoint management, where every connected device—desktop, laptop, tablet, phone and ‘thing’—can be seamlessly deployed, managed and secured within one easy-to-use administrative console. We are excited to once again deliver upon AirWatch’s commitment to empowering our customers with an innovative, elegant solution that enables productive and secure business mobility.

Blog | Endpoint Management · 14. December 2015
This new report, The Forrester Wave™: Enterprise Mobile Management, Q4 2015, evaluates EMM providers across a broad range of categories. Learn why MobileIron was given the highest possible score in 10 of the EMM evaluation criteria, including containerization, app management, enterprise app store experience, identity and access control, OS support, and PC/Mac management.

Blog | Endpoint Management · 02. November 2015
BlackBerry, a global leader in secure mobile communications, today announced it has completed the acquisition of Good Technology. BlackBerry will integrate Good’s software solutions and services with its own software suites to offer the industry’s most complete end-to-end solution that secures the entire mobile enterprise, across all platforms and applications while protecting personal privacy. With the acquisition of Good, BlackBerry has expanded its ability to offer a unified, secure...