With Galaxy S6 and Galaxy S6 Edge, its latest additions to the Galaxy S lineup, introduced at Mobile World Congress, Samsung is illustrating that it remains a key player when it comes to Android in the enterprise.
Samsung is no stranger to enterprise mobility
Samsung is hardly a stranger to enterprise mobility. Two years ago, the company announced its KNOX security...Read More →
For far too long, CISOs have been caught between two competing agendas. First, they need to protect their critical business data and meet ongoing (and ever-changing) compliance requirements. Second is the resounding drumbeat from Android users who want serious enterprise support for their favorite mobile devices and apps — with no excuses. Since Android is now the dominant global...Read More →
App Deployment Before Android for Work
Secure app deployment has been the biggest obstacle for enterprises looking to add Android to their BYOD environment. Before the release of Android for Work, IT could install apps on an Android device in just one of three ways, all of which have drawbacks...Read More →
The Android platform has quickly established itself as a dominant mobile OS for consumers. However,...Read More →
Samsung’s KNOX platform, originally announced two years ago, provides a highly secure Android experience for both consumers and enterprises. The platform, available on many of Samsung’s high-end devices incorporates a range of hardware and software features that deliver a highly secure package. The most often discussed feature of Samsung KNOX is its secure data...Read More →
Turn it into an advantage with document-level security
In a Mobile First world, employees have become accustomed to selecting and using a range of tools that empower them to build the most effective and efficient workflows for their job roles. This often includes mobile devices, apps, and cloud services that are consumer- rather than enterprise-focused. Services like Box, Dropbox, and...Read More →
Shadow IT – employees individually or collectively relying on unmanaged devices, sourcing their own mobile apps and cloud services, and creating their own technology workflows has become a major source of concern for many IT departments.
Shadow IT presents a range of...Read More →
With 2015 under way, it seems an appropriate time to look forward not just to what IT departments are going to deal with in the new year but also to how mobile, cloud, and other technologies will redefine IT over the next five years. The truth is that the changes that...Read More →