By default, the ‘Wi-Fi’ tab lists all Wi-Fi networks configured on the selected device, excluding networks managed through group policies. To review Wi-Fi networks configured...
If an email account type has been set to POP, emails are retained on the device. If set to IMAP emails shall not be stored on the device, however downloaded attachments which may contain sensitive corporate data are.
To...
When a Parallels MDM account is created, the email address and password selected produce the Master administrator for that account. Administrator credentials are used to log into a Parallels MDM account. Additional administrators can...
How to Remove Exchange Accounts on your Android Devices
Remove Exchange account
In the occasion that the Exchange account is to be removed from this device, using Parallels MDM all related data such as downloaded attachments and account information shall also be remove according to the next steps:
Go to the ‘Devices’ node.
Select a device.
Click...
The Benefits of Utilizing RemoteFX Technology in a Virtual Network
Exploring different scenarios where RemoteFX technology enhances the graphical capabilities of virtual networks.
— Brought to you by the 2X Cloud Computing Team –
With user experience design becoming an important element in every project, remote networks are looking to incorporate this...
Put Your Mind at Ease By Securing Aquamail
As a security measure define a PIN code required to access Aquamail should the device fall into the wrong hands. Additionally secure company data by removing the Email/ Exchange account from 2X MDM.
Configure a PIN code from Aquamail > Settings > Security > App access control.
2X Remote Application Server is the perfect replacement for Citrix
2X Remote Application Server provides simplicity in virtual desktop and application publishing at a fraction of the cost of Citrix.
On February 18th, 2014, Eric Blum, an IT Manager for one of the top 500 companies, conducted a product review of 2X Remote Application Server version 11. The review...
The unauthorized use of a device could result with the need to take action to prevent the user from further accessing the device or in extreme situations, wipe the device of all of its data.
Lock a Device
Lock a device and optionally...