The Bring Your Own Device (BYOD) movement has been well adopted by enterprises all around the world, hoping for increased productivity and reduced enterprise costs. With the variety of devices available in the market today security challenges have grown. BYOD can turn...
Remote desktop protocol (RDP) is a secure proprietary communication protocol initially built by Microsoft. It allows two PCs to share a graphical user interface (GUI) over a standardized transmission control protocol (TCP)/internet protocol (IP)...
Improved iOS Support Added to the New Version of 2X MDM
We pleased to announce the release of the latest version of 2X MDM (6.4.5) which has significantly enhanced iOS support. Administrators can now disable an iPhone’s camera, as well as prevent users from accessing the Safari browser and iTunes. We’re now using Microsoft’s Bing...
IT Manager's Headache: Managing Corporate Email on Mobile Devices
Picture this you’re the IT Manager at ABC Ltd, and you have just come out of a meeting with the CEO. During the meeting the CEO announced that he wants you to install the corporate emails of all 300 sales people on their mobile devices. He is unhappy with the fact that clients are sending...
2X MDM of Steel – Reclaim Control of Corporate Email on Android!
Secure your sensitive email attachments and remote control your Android devices with the new 2X MDM release.
LONDON UK, 9 JULY 2013 – 2X, developer of the award-winning Windows VoIP PBX 3CX Phone System, announces the launch of 2X MDM version 6.3 which provides unparalleled Android...
New 2X MDM iOS Client
Administrators can now send an email invitation to their users that allows them to automatically configure the 2X MDM account.
New Features
– Ability to configure 2X MDM via email attachment
– Added an advanced section to connect to a different server.
Bug Fixes /...
Forget About Data Breaches with 2X MDM Wi-Fi Management!
You’ve received your standard quota of calls from your colleagues telling you there’s an issue with their PC, printer, etc., to which you give your standard reply “Have you tried turning it off and on again?” You then receive a call that isn’t easily remedied with a...
10-Time Microsoft MVP Brien Posey Provides His Considerations For User Device Security
User Device Security Considerations
— Brought to you by 2X Cloud Computing guest blogger Brien M. Posey —
In a virtual desktop environment, it is usually the virtual desktops themselves that received the most attention. Administrators work tirelessly to ensure that virtual desktops are...