search

2023 Gartner Magic Quadrant for MMS: Our Visionary Ranking Continues

For the fifth consecutive year, imei partner GEMA (Switzerland-based Global Enterprise Mobility Alliance) has been recognised in the Gartner Magic Quadrant for Managed Mobility Services (MMS), scoring a visionary ranking for the fourth time. GEMA provides enterprise mobility managed services for multinational organisations through its network of in-country experts such as imei.

Topics: News Lifecycle

EMM is your first line of defence in enterprise mobility security

Enterprise mobility management (EMM) provides an essential toolset to help manage the way your people use mobile devices for business processes and communications. EMM goes far beyond mobile device management (MDM), it forms your first line of defence against enterprise mobility security threats. The security features in today's EMM tools help keep customer and corporate data safe.

Topics: Lifecycle

Enabling Calling to Mobiles and Landlines From Teams

Rewind the clock just a few short years and the office desk phone was an essential part of the work communication experience. Before mobile phones were commonplace and when making calls on them was expensive, the office desk phone was the primary way to talk with colleagues and clients.

Topics: Unified Communications Connectivity

What is SASE and Why You Need It: The Benefits of Moving to a SASE Model

The rapid adoption of SaaS applications and the growth of flexible working with more of the workforce working remotely, it’s not uncommon for companies to be using multiple management tools to secure and govern access to cloud services.

Topics: Security Connectivity Network

The Importance of Trusted Sources for App Installs

The discovery of two new advanced Android surveillance ware instances in July serves as a timely reminder for Australian companies to maintain a robust security posture. The surveillance ware, known as WyrmSpy and DragonEgg, have sophisticated data collection and exfiltration capabilities, and can be used to collect a wide range of data from infected devices. Both are attributed to the high-profile, state-sponsored espionage group APT41.

Topics: Security