Acronyms, acronyms! The Mobile Device Management (MDM) world is filled with them. In a previous article, we introduced Zero Touch Enrollment Programs (ZTEPs) to achieve supervision. However, there are several different ZTEPs, and therefore several acronyms that you...
When setting up a new MDM, it is best to first envision the goals that you would like to achieve through its deployment. Objectives can vary by client, but securing devices from theft and managing activation locks from previous employee’s devices (Apple IDs / Google...
Technology gives employees the flexibility to work from almost anywhere, but managing their smartphones, tablets, and other mobile devices can be time-consuming and complicated. For many companies, managing mobile devices is a challenge that leads to gaps and...
What is it? Activation lock is a feature designed to secure and protect your personal data if your device becomes lost or stolen. When you start the initial setup of a device, it will contact the manufacturer’s activation server to verify the device is eligible for...
Updated: Mar 23 The problem with traditional authentication In an era of increased cyber-attacks, especially on organizations, multi-factor authentication should be nonnegotiable. Multi-factor authentication secures identity and is essential for strong security. In...
Updated: Mar 23 Our Shootout Series takes one important MDM feature and tests it in our lab. What is it? Location services is an MDM feature that tracks the whereabouts of mobile devices through satellite signals, cell towers, hotspots, and WiFi networks....
Updated: Mar 23 With the rise in work-from-home and the mobile worker comes an increased desire to find a better way to manage mobile devices. Unfortunately, the promises of the MDM/UEM hype may not all be fulfilled. Here are some MDM myths – previously covered...
Updated: Mar 23 We are often asked: which MDM is the best MDM? We at LINQ can help you evaluate this question, but first it’s important to understand that mobile device management is not “one-size-fits-all” software. Therefore, it is important to...