Let’s compare the app wrapping capabilities of Mobile Secure, the cloud-hosted EMM solution by SAP, and Afaria, the on-premise version of the same thing. If you don’t know what app wrapping[…]
Read moreCategory: Technology
Posts about Information Technology
MDM is dead, long live EMM
I thought I was creative with my post title, but it turns out that if you google the phrase “MDM is dead” you’ll turn up with tons of results.[…]
Read moreFuture of MDM: UEM?
When it comes to mobile device management there are so many acronyms that it’s kind of ridiculous. What is even more ridiculous is that the majority of these acronyms[…]
Read moreApp Wrapping vs Managed App Configuration
App wrapping and managed app configurations are both part of MAM, or mobile application management. Both ways allow companies to configure and manage apps in some form or fashion.[…]
Read moreWhat is App Wrapping?
What is the point of “app wrapping?” Well, most apps by themselves are unprotected and un-managed. Employees that download un-managed corporate apps pose a risk to their company by possibly having sensitive[…]
Read moreAndroid MDM without a valid SIM card (Afaria error ONS1032)
One good thing about iOS devices is that they can receive MDM commands through cellular data or wifi, all without even having a SIM card inside of them. That[…]
Read moreMDM for Windows 8.0 Devices (Afaria ONS5001 WNS Error)
Hello excited MDM implementers! You may be wanting to implement BYOD at your company, and want to accommodate Windows Phone 8.0 devices. Well, just remember that Windows Phone devices[…]
Read moreManaging MDM While Upgrading SHA1 Certs to SHA2
Managing an MDM environment in the middle of a corporate-wide certificate upgrade can get a little complicated. As an MDM admin, you not only have to make sure that MDM certificates[…]
Read moreMy Easy Take On the SHA1 Certificate Issue
SHA1 is about to die. As a regular user, what is SHA1 and why should you care? Well, if you’re a regular person, you like to go onto the internet[…]
Read moreSetting up RDP Two-Factor Authentication with Duo
Let’s say you want to protect your server’s RDP sessions from attacks. What are the most basic steps? Disable the Administrator account, change the RDP port, enable NLA, and[…]
Read more