Apperian‘s insider publication on Mobile App Management (MAM®) for the enterprise.

Georgia Southern University Mobile Strategy

Download this case study to learn how Georgia Southern University securely condensed their 67 mobile apps into a single, university-branded private app store. Using mobile app management to securely deliver apps to users based on their roles and devices, GSU is now able to drive students and faculty to a central location for finding and […]

Linux Containers for App Security

LXC app security

A major focus in security is preventing system intrusion resulting from vulnerabilities in the software running on it. However an equally important consideration is mitigation and isolation – if an attacker is successfully able to compromise a single node in a system, how do you prevent the attack from spreading? Isolating a complex system into […]

How Will You Distribute That Enterprise Mobile App You’re Developing?

How Will You Distribute That Enterprise Mobile App You’re Developing

Many companies are opting to develop their own custom enterprise mobile apps for employees, contractors, business partners, and even customers to use. Often, the primary driver for building custom apps is ensuring that target users are provided with the specific features, functionality, and access to data that’s required in their roles. For many organizations, the initial […]

Apperian Enables a New, Highly-Secure Tablet with IBM, Secusmart and Samsung


We’re really excited to see that this weekend’s unveiling of the highly secured tablet, SecuTABLET at CeBIT is gaining so much attention! The solution, which was made possible through our partnership with IBM and Secusmart (a Blackberry subsidiary focused on digital security), was described on Bloomberg as being able to “spy-proof” Samsung tablets. The SecuTABLET is a […]

Mobility for the Extended Enterprise

Mobile App Distribution: Mobilizing Your Dealer Network

When organizational leaders think about enterprise mobile apps, they often focus on the potential productivity benefits that are directly generated from employee usage. But in reality, today’s extended enterprise is highly distributed. Work teams across various geographies, business partners, contract workers, franchisees, field staff, and dealers are often using the same apps that employees use—offering […]

Recap: Boston Higher Ed Mobility Professional Meetup


Tufts University explained that 90% of students access university resources via a mobile device, clearly justifying the need for mobility within higher ed. With impressive attendance from some of the top higher education institutions in the Boston area including Brandeis, Harvard, Simmons and Boston University, this morning’s Higher Ed Mobility Professional Meetup resulted in a lively […]

Enterprise Mobility 4.0: Reaching the Extended Enterprise

Enterprise Mobility 4.0: Reaching the Extended Enterprise

Enterprise mobility has progressed dramatically in recent years. What started as basic email and calendar applications quickly evolved into enterprise mobility 2.0: internal web apps with the ability to sync and share data on corporate-owned devices. Not far behind v2.0 was v3.0: custom applications with the ability to support business process end-to-end on employee-owned devices. […]

Will you be getting an Apple Watch? Apperian’s take on the Apple Watch Announcement


This is the first completely new product to come out of Apple in about 5 years, the last being the iPad. The Apple Watch is an interesting piece of technology and will be even more interesting to see how the mass market responds to both it’s style and capabilities. Will it be loved or hated? I […]

Office Move Inspires Mobile Strategy

Download this case study to learn how an office move inspired this organization’s mobile strategy. They started out with a single app to help their employees navigate a new building, which spring-boarded them with a lot of excitement and ideas on how to use mobile within their organization. Benefits achieved: Enterprise app was designed, developed, […]

How Effective BYOD Policies Can Help Limit Legal Exposure

How Effective BYOD Policies Can Help Limit Legal Exposure

In and of themselves, BYOD programs don’t pose legal issues to companies that use them. However, when employees circumvent organizational security protocols to access work-related systems—such as policies against accessing insecure public WiFi networks—this exposes the organization to uncontrolled levels of risk, as do other aspects of connectivity to systems that contain sensitive corporate and […]