Remote desktop protocol (RDP) is a secure proprietary communication protocol initially built by Microsoft. It allows two PCs to share a graphical user interface (GUI) over a standardized transmission control protocol (TCP)/internet protocol (IP)...
Improved iOS Support Added to the New Version of 2X MDM
We pleased to announce the release of the latest version of 2X MDM (6.4.5) which has significantly enhanced iOS support. Administrators can now disable an iPhone’s camera, as well as prevent users from accessing the Safari browser and iTunes. We’re now using Microsoft’s Bing...
IT Manager's Headache: Managing Corporate Email on Mobile Devices
Picture this you’re the IT Manager at ABC Ltd, and you have just come out of a meeting with the CEO. During the meeting the CEO announced that he wants you to install the corporate emails of all 300 sales people on their mobile devices. He is unhappy with the fact that clients are sending...
2X MDM of Steel – Reclaim Control of Corporate Email on Android!
Secure your sensitive email attachments and remote control your Android devices with the new 2X MDM release.
LONDON UK, 9 JULY 2013 – 2X, developer of the award-winning Windows VoIP PBX 3CX Phone System, announces the launch of 2X MDM version 6.3 which provides unparalleled Android...
New 2X MDM iOS Client
Administrators can now send an email invitation to their users that allows them to automatically configure the 2X MDM account.
New Features
– Ability to configure 2X MDM via email attachment
– Added an advanced section to connect to a different server.
Bug Fixes /...
Forget About Data Breaches with 2X MDM Wi-Fi Management!
You’ve received your standard quota of calls from your colleagues telling you there’s an issue with their PC, printer, etc., to which you give your standard reply “Have you tried turning it off and on again?” You then receive a call that isn’t easily remedied with a...
10-Time Microsoft MVP Brien Posey Provides His Considerations For User Device Security
User Device Security Considerations
— Brought to you by 2X Cloud Computing guest blogger Brien M. Posey —
In a virtual desktop environment, it is usually the virtual desktops themselves that received the most attention. Administrators work tirelessly to ensure that virtual desktops are...
10-Time Microsoft MVP Brien Posey Discusses the Use of Virtual Desktops as a Data Access Security Solution
Using Virtual Desktops as a Data Access Security Solution
— Brought to you by 2X Cloud Computing guest blogger Brien M. Posey —
In the not too distant past, the general assumption was that most corporate applications would be accessed from within the network perimeter. Today this...