Microsoft combines Intune with ConfigMgr

Microsoft has combined its System Center Configuration Manager (ConfigMgr) with its Intune unified endpoint management (UEM) platform, enabling users to access both using just one interface. The combined products are now called Endpoint Manager, which makes licensing for Intune available to all ConfigMgr customers to co-manage Windows devices. Between the …

Q&A: How one college embraced UEM to manage endpoints at five campuses

Steve Malaglowicz was hired 25 years ago by Truckee Meadows Community College in Reno, Nev. to oversee the rollout of Novell ZENworks and to bring desktop imaging to the institution. Over time, Malaglowicz, the school’s senior technician, said ZENworks became too expensive and Novell too difficult to work with for …

Can you be mobile AND secure?

Most companies today allow their workforce to employ mobile devices to access corporate back office systems (e.g., email, sale force automation, ERP, HR, data collection, form filling, collaboration, etc.). And while these devices can be convenient, it’s important that organizations know how to maximize the security of these corporately connected …

Your guide to using iCloud in business

Use of iOS across the enterprise is increasing. Tight integration between iPhones, iOS and iCloud present an opportunity to exploit Apple’s online device and data backup service. Spiceworks claims 7 percent of enterprise software budgets will be spent on backup and recovery in 2019. FAO Schwarz recently moved to deploy Apple …

How to create a mobile policy for Android devices

Although Apple’s iPhone and iPad make up the majority of mobile devices used in business, Android also makes a strong showing today. The notion that Android isn’t a viable enterprise platform, while maybe accurate a number of years ago, has become outdated. In some ways, Google actually tops Apple in …

Download: EMM vendor comparison chart 2019

While mobile device management (MDM) capabilities have been the core driver of interest in enterprise mobility products up to this point, these tools have largely transformed into full-blown enterprise mobility management (EMM) suites, which include app and data security, among many other things. All the major offerings in this arena …

Enterprise mobility 2019: Dawning of the age of UEM

Unified endpoint management (UEM), a strategic approach that unifies and centralizes the way enterprises manage their deployed devices, is finally becoming a reality. Over the past decade, enterprise mobility platform vendors have been evolving mobility management tools from simple mobile device management (MDM) through mobile application management (MAM) and enterprise …

Microsoft delivers Defender ATP security service to Macs

Microsoft on Monday made good on a March pledge by announcing that its most sophisticated endpoint security service is now available for Macs. Microsoft Defender ATP (Advanced Threat Protection) for Mac shifted to what the company calls “general availability” on June 28, wrote Helen Allas, a principal program manager on …

Apple eyes changes to iOS device management

Last week’s Worldwide Developers Conference keynote was loaded with news about  iOS 13, watchOS 6, macOS Catalina, the newly christened iPadOS and the new Mac Pro (which returns to a tower enclosure with serious upgrade and customization options). [ Related: How to craft an MDM policy BYOD workers will actually …

Free course: Managing PCs and Devices with Microsoft Intune

In this modern-day mobile world in which we work, IT admins often find themselves facing a bewildering number of challenges brought on by the surge of mobile devices in the office and the consumerization of IT. One answer to managing all of those corporate devices: Microsoft Intune. In partnership with …

‘Sign In with Apple’ isn’t for business – yet

Apple’s new online authorization feature in iOS 13 – Sign in with Apple – allows iPhone, iPad and Mac users to securely sign into apps and websites. But it’s not likely a competitor for business mobile device management (MDM) platforms that also protect user log-ins. While Sign In with Apple …

How to craft an MDM policy BYOD workers will actually follow

The bring-your-own-device (BYOD) trend has long since moved from being an outlier to the norm for most companies and employees. But with all those devices come a wealth of potential security problems. Rogue apps, malware, data breaches are sometimes just a click or swipe away. Even with that reality, crafting …

Enterprise mobile management: Where do we go from here?

Mobile has become a mainstream tool for the vast majority of enterprise workers. Indeed, over the past three to four years, instead of being viewed as an emerging technology, it’s basically made the transition to a mature solution that’s been almost universally accepted. That’s not to say mobile doesn’t have …