When Stalkerware Stalks the Enterprise

Fifty years ago, Cold War spy tradecraft required ingenious, purpose-built spy technologies. These included tiny cameras that photographed through button-holes

Read more

5 Reasons You’re Spending Too Much Time, Energy and Money on Endpoint Management

You are not going crazy — endpoint management requirements and challenges really are far more complex than they have been

Read more

The Forrester Wave: Unified Endpoint Management, Q4 2019 — The Next Phase of UEM Evolution

Last year, Forrester separated out unified endpoint management (UEM) into its own category in its research, defining UEM as “products

Read more

Data Privacy in the Modern Workplace

Over the last year, there have been several jaw-dropping fines for privacy breaches. In the U.S., the Federal Trade Commission

Read more

Breaking Down Gartner’s 2019 Critical Capabilities for Unified Endpoint Management (UEM) Tools

Business begins at the endpoint. Cheap puns aside, nearly all business processes, from employee collaboration to customer interaction, require the

Read more

How to Tell Safe Advertisements From Dangerous Malvertising

Advertising is the life blood of the internet. Some of the world’s biggest and most influential tech companies earn a

Read more

Why Zero Trust Is Critical to a Productive Mobile Workforce

The concept of zero trust has been around since John Kindervag coined the term in 2010. Google’s internal implementation through

Read more

iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

Apple users of the world, 13 is your lucky number: iOS 13 has arrived! This new iteration of Apple’s mobile

Read more

Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

The circle of life is predictable and short for corporate-owned mobile devices. Aging devices are ideally retired before they become

Read more