Resources

BYOD-User

BYOD Sample Contract/Template

Would you like to introduce BYOD (Bring Your Own Device) in your company? Download our free template for contractual arrangements with employees. The template ensures the best possible transparency for all parties involved and includes a concrete proposal for the subsidisation of employee devices.

Laptop-Arbeitsplatz

Visit the Cortado Blog!

On our blog, we keep you up to date with all the latest news about Cortado MDM, share our knowledge of current market trends, and provide tips on how to effectively plan and implement your mobile strategy.

BYOD: More Than Just a Trend

BYOD: More Than Just a Trend

On-Demand Web Session

In this webinar, we'll show you how to integrate the latest Android and iOS features into a well-prepared "bring-your-own-device" (BYOD) strategy to promote employee mobility and overcome common data protection, privacy and enforcement challenges.

Whitepaper-icon 400x400-Expirience-Report-BYOD-COPE

Introducing a Successful BYOD or COPE Strategy

We Share Our Experiences

Introducing BYOD (Bring Your Own Device) is a great way for organizations to respond to the growing necessity of mobile and remote working. In this free document, we share our experiences on what separates a successful device management scheme with high employee uptake, from poorly planned schemes which fail or are unnecessarily restrictive.

Whitepaper User Enrollment

Apple User Enrollment for BYOD

Thanks to User Enrollment, companies have a new way to integrate BYOD mobile devices. In this white paper you will learn more about which policies, commands and profile settings IT admins can implement with User Enrollment and which management options will no longer be possible for Apple BYOD in the future.

Download White Paper: MDM für Einsteiger

The Beginner’s Guide to Mobile Device Management

White Paper

This white paper is aimed at newcomers to the topic of MDM and is intended to advise those who are considering introducing a Mobile Device Management system in their company. IT managers can see how they can ensure security, transparency and control with MDM when smartphones and tablets are being used in the company. The white paper also aims to defuse concerns related to the implementation of MDM itself. In doing so we hope to demonstrate not only how uncomplicated MDM systems are but also the great range of advantages that it brings.

Man, der ein Handy hält

How To Use WhatsApp in your Company

Learn more about how to make WhatsApp business-friendly with Cortado Server in our webinar.

Highlights

  • WhatsApp in a secure business container
  • Alternative approaches
  • Protection of company data

icon

The Apple Device Enrollment Program – Whitepaper

Integrate iOS devices into your company‘s IT

The Apple Device Enrollment Program (DEP) offers the opportunity for you to quickly and easily integrate iOS devices into the business IT. With DEP, and providing an EMM solution is used, iOS devices can now be brought into service and configured in just a few steps. Administrators are now able to configure the devices without having to actually set hands on them. In this document you will discover how the Cortado Server EMM solution can be used with DEP to integrate company-owned iOS devices into your IT landscape.

icon

How To Set Up A Secure iOS Business Container

Read our free guide on how you get the most out of Apple’s business features for iOS devices in your organization.

To securely manage and control business data on an iPhone or iPad, it is recommended to set up a secure business container. The use of managed apps and domains ensures that sensitive corporate data remains within the business container. In addition, the data stream is protected by connecting to a Per App VPN. In this white paper, you will learn how to build a secure native business container in just a few steps.

Whitepaper-Android App Management

Mobile Application Management (MAM) for Android

How to Guarantee Security and Productivity for Android Devices in Business Use

Personal and business data should always be separated on smartphones and tablets, as mobile working with unmanaged apps results in a high security risk to companies. This resource shows you how Android devices are being transformed into secure and productive work tools with the help of MAM – mobile application management.

icon

VPN with iOS

Which type of virtual private network is best for you?

VPN is the most viable and secure solution for data communication today, for both companies and end users. With the use of smartphones and tablets in the corporate world, standard VPN solutions are often not sufficient. Depending on the usage, security, and compliance requirements of the company, more VPN models are required. That's why Apple, especially since iOS 8, offers a broad range of VPN settings. Discover in this white paper more about the various VPNs and how to combine them with iPhones and iPads.

icon

App Wrapping and SDKs

Five disadvantages to Be Aware Of

Although some providers are still operating, the number of app wrapping vendors has dwindled over the last 10 years. Read here why more efficient and secure alternatives based on native app management are now the MDM industry standard.

How Mobility is Changing Healthcare

How Mobility is Changing Healthcare

The use of fitness and health apps is becoming more and more common. There's a huge potential for savings and at the same time interesting opportunities to improve processes in healthcare and in the development of e-health. Get an overview in this infographic of how mobility is changing healthcare systems.