User Profile
Rose
Google Team
Joined 2 years ago
User Widgets
Contributions
Supporting every employee: Discover 9 helpful Android accessibility features
In today's workplace, making work devices accessible is not just good practice, it's essential. Almost half (45%) of employees with disabilities find the accessibility features of their workplace software barely adequate.1 The reality is that inaccessible workplace software creates a significant challenge for many employees, underscoring the gap in providing truly inclusive tools. Our new Android Enterprise blog post, "9 Android features to support workplace accessibility", explores how Android is addressing the need for better assistive technology with a robust suite of built-in vision, audio, and mobility accessibility tools—designed by and for people with disabilities. It covers key topics like: Supporting a range of visual needs with Android's adaptable vision features: From Braille Display support and the AI-powered Lookout app to TalkBack screen reader, Android offers a range of customizable visual tools. Helping teams amplify what matters at work with Android's hearing tools: Android provides audio features that adapt to a range of hearing needs, including Real-time text (RTT), Sound Amplifier, and seamless hearing aid integration (including the new LE audio support). Unlocking personalized control for employees with motor limitations: Support employees by providing tools that help them own their workday with personalized control such as, Gesture Navigation, Camera Switches, and Action Blocks. This isn't just about meeting accessibility standards – it's about helping teams interact with their work devices more effectively and independently. Read the full blog post here to learn more. Now, let's open up the conversation! We want to hear from you. What accessibility challenges are you facing in your organization? Do you use any of the features mentioned? How can we, as a community, advocate for better accessibility in the workplace? Are there any other features you’d like to see in the future? Share your thoughts and experiences below! 1 https://www.capterra.com/resources/technology-accessibility/475Views1like3CommentsDebunking 12 Android Enterprise myths
Have you ever heard statements like “Android just isn’t secure” or been asked whether BYOD is too risky for enterprise? These concerns, often based on outdated perceptions, can prevent businesses from fully realizing the benefits of Android Enterprise. So, let’s cut through the noise. Here we’ll address 12 common misconceptions and explore the realities of deploying and managing Android devices in today’s modern workplace. Myth 1: Is Android really less secure? Reality: Always-on security. Android offers proven, multi-layered, proactive security With a zero-trust approach to security, Android operates under the principle of "never trust, always verify." It continuously assesses the security posture of devices and applications, and grants access based on real-time risk assessments. Built-in security at every level includes hardware-level safeguards like verified boot and encryption, software-level protections such as application sandboxing, and proactive threat detection with Google Play Protect. The result is robust defense. Combined with granular control organizations maintain a high level of security while empowering employees with the flexibility of mobile work. Want to dive deeper? Enjoy a cup of tea while you explore our security paper. Myth 2: Android Enterprise is only suitable for large enterprises Reality: Designed for scalability, Android Enterprise can be effectively deployed by businesses of all sizes Android Enterprise offers a range of options to deploy and manage Android devices, so businesses of all sizes can choose the model that best suits their needs and budget. For smaller businesses, BYOD can significantly reduce upfront costs associated with purchasing and managing a fleet of company-owned devices. Plus, the Google Admin console provides a user-friendly interface, simplifying tasks like device provisioning and policy enforcement, making it easier for businesses with limited IT resources to manage their mobile workforce effectively. By offering a range of deployment options, simplified management tools, and cost-effective solutions, Android Enterprise empowers businesses of all sizes to leverage effective device management. Myth 3: BYOD is too risky for enterprise environments Reality: With the right approach, Bring-Your-Own-Device (BYOD) can be a secure and cost-effective strategy Android Work Profile provides a self-contained profile on an Android device that isolates work apps and data from personal apps and data, enabling businesses to safely implement BYOD policies. This secure container safeguards sensitive company data through robust encryption and remote wipe capabilities, even if personal apps are compromised. Work Profile also empowers organizations with enhanced app management capabilities. Businesses can implement approved app lists, ensuring only necessary applications are used for work, without impacting personal app usage. Additionally, they can enforce restrictions on specific app functionalities within the work environment. With these advanced security and management features, Work Profile empowers organizations to securely embrace the flexibility of BYOD. For more detail explore this Work Profile Security on Company Owned Devices paper. Myth 4: Android Enterprise is too complex to implement and manage Reality: Android Enterprise simplifies device management with powerful tools designed for businesses Android Enterprise has significantly simplified management with features like zero-touch enrollment for easy device setup and streamlined policies for controlling work apps and data. Managed Google Play empowers IT administrators with granular control over app distribution and management, ensuring only approved applications are installed on company devices, including tailored company apps. By integrating with leading EMM providers to leverage these tools, businesses can easily customize devices to meet their specific needs, enforce security policies, and manage their mobile workforce efficiently. Myth 5: Android devices are more susceptible to malware Reality: All mobile devices can be targets for malware, but Android has implemented robust security measures to protect against threats Google Play Protect leverages machine learning to proactively detect and combat malware, phishing attacks, and ransomware. It scans apps both before and after installation, even monitoring them for suspicious behavior after download. This proactive approach, combined with regular security updates, provides a robust defense against malicious software, significantly reducing the risk of installing and running harmful apps on Android devices. See for yourself with our Transparency Report. It highlights just how rare downloading potentially harmful applications on an Enterprise device really is. Myth 6: BYOD makes it difficult to achieve a good work-life balance Reality: Android Work Profile allows employees to easily switch between work and personal profiles, enabling them to disconnect from work when they need to By separating work and personal data and apps, Work Profile helps employees maintain a clear boundary between work and personal life, reducing stress and enhancing well-being. Employees can seamlessly switch between the Work Profile, and their personal profile, enjoying a familiar device environment while empowered to toggle off work notifications and fully disconnect for a better work-life balance, increased productivity and employee wellbeing. Myth 7: Android Enterprise is not suitable for highly regulated industries Reality: Android Enterprise provides the robust security and compliance features necessary for highly regulated industries Highly regulated industries require robust mobility management solutions with exceptional flexibility and control. Android Enterprise delivers strong security, powerful device management, and innovative solutions to manage and deploy devices seamlessly across diverse use cases. Continuously evolving to address dynamic compliance requirements, Android 15 introduced enhanced security logging aligned with the latest NIAP regulations. Plus, the Android Management API empowers businesses with the agility to adapt policies and ensure compliance with developing industry regulations and security standards. Discover how Android Enterprise empowers financial services in our customer stories, or explore exactly how we comply with industry standards and Android’s certifications in our security paper. Myth 8: Android is fragmented and updates are slow Reality: Android ensures a smooth and consistent user experience alongside simple and robust management capabilities While Android's open nature has historically presented challenges in terms of device fragmentation and update consistency, this view is outdated. As an open-source platform, Android benefits from rigorous scrutiny by a diverse community, including developers, security researchers, and even government agencies. This constant feedback accelerates security advancements. Initiatives like Project Treble have revolutionized the update process by decoupling core Android components from device-specific software. This allows manufacturers to deliver the latest security patches and feature updates more quickly and efficiently. The Android Enterprise Recommended program prioritizes timely security updates and OS upgrades for participating devices, ensuring a more consistent and secure user experience. More widely, Google releases monthly security updates to the platform, the details of which can be found on the Android Security Bulletin. Recommended EMM partners provide essential tools for managing these device updates, ensuring timely patching to maintain a secure mobile environment. Myth 9: Android devices aren't premium Reality: The Android ecosystem boasts a wide range of devices, from budget-friendly options to high-end flagships that rival the best in the industry Premium Android devices offer cutting-edge features like powerful processors, high-resolution displays, and advanced camera features, and innovative designs for a premium user experience. To ensure a consistent and high-quality experience for businesses, the Android Enterprise Recommended program certifies devices and solutions that meet Google's strict enterprise requirements, giving businesses confidence in their chosen devices. Myth 10: The Play Store is limited Reality: The Google Play Store is a vast marketplace with millions of apps, including a wide range of enterprise-grade solutions. From productivity tools and communication apps to industry-specific solutions, the Play Store offers a diverse range of applications to meet the unique needs of any business. Plus, the Play Store empowers businesses to develop and distribute custom applications. By leveraging Android developer tools, businesses can create tailored solutions and securely distribute them to their employees through Managed Google Play. This effectively creates a custom app store while benefiting from the built-in security and robust infrastructure of Google Play Protect. Myth 11: Android Enterprise devices are separate to regular Android devices Reality: The hardware remains the same Android Enterprise is not a separate operating system. It's a suite of tools that enhances the core Android OS with enterprise-grade features and management capabilities. This means any Android device can leverage Android Enterprise, providing businesses with the flexibility and control to meet their specific mobility requirements while maintaining the familiar Android user experience. Myth 12: You can only use Android Enterprise with Google's products and services Reality: While Google offers a robust suite of productivity and collaboration tools, Android Enterprise is designed to be highly interoperable Android Enterprise is only supported on Play protect certified devices. These devices often come pre-installed with popular Google services like Chrome, Google Play Store, and Google Maps (GMS). However, this does not limit users to Google's ecosystem. Android Enterprise seamlessly integrates with a wide range of third-party enterprise applications and services, including those from Microsoft, Salesforce, and others. This flexibility empowers businesses to choose the best software solutions for their specific needs, regardless of their preferred technology stack. Were you surprised by any of these myths? Have you encountered similar challenges or misconceptions in your own experiences? Let us know in the comments below.Introducing the different Android device management options
If you’re just starting out with device management and are looking to maximize your investment, whilst also maximizing security and data protection, then read on. Android Enterprise offers a range of options to deploy and manage Android devices, depending on how they’ll be used and your specific needs. From locked down to free use, you’re able to address every device scenario across your enterprise. Let’s explore the options below. Fully managed devices: Tight security, maximum control Imagine a company-owned device where IT has complete control. This is full device management. IT admins have comprehensive device and app management capabilities for company-owned devices, meaning they can set security policies, control apps, and even manage the user interface. Benefits: Ironclad security! IT admins control device policies and requirements, ensuring company data stays protected and remains compliant. Use cases: Ideal for industries with strict regulations like healthcare or finance. Think devices used in point-of-sale systems, healthcare data collection, or other scenarios demanding maximum security. Considerations: Employees lose some personal device freedom and user privacy is not prioritized. Setting up and managing a large number of devices can be resource-intensive for IT. Devices are supplied by the company, which could be a large upfront cost and may require end-user training or support. You can explore all the features of full device management here. Dedicated devices: Single-purpose powerhouses This option transforms an Android device into a dedicated work machine. Think digital signage, kiosks, or ruggedized devices for field use. Benefits: Apps and functionalities are locked down, preventing accidental misuse and keeping the device focused on its work purpose. It enhances security by preventing all device actions beyond those intended, and enables a device for shared users and experiences. Use cases: Ideal for retail displays, self-service kiosks, logistics tracking devices, or any scenario requiring a dedicated work tool. Considerations: Limited functionality. These devices can't be used for personal tasks and may require specialized hardware or software configurations. You can explore the supported features on dedicated devices here. Work Profile: Balance security and user experience Android Work Profile is a secure work environment on a personal or personally enabled device. Work apps and data are completely contained and separated from personal information, offering a good balance between security and user convenience. Benefits: Work and personal data remains safe and separate, guaranteeing user privacy. Employees can use their familiar, preferred Android devices while IT admins maintain control over work data, keeping it secure. Businesses don’t have to spend money on new enterprise devices, but are still able to securely manage company apps, data and permissions. Plus, employees are empowered to toggle off work notifications at the end of the day, helping to prevent burnout and improve work-life balance. Use cases: Suitable for both Bring Your Own Device (BYOD) or Company Owned Personally Enabled (COPE) policies. Ideal for hybrid work models - think business teams and executives who want to use personal devices to access work apps and tools to stay productive while in the office or on the go. Considerations: Some security features may be dependent upon company security requirements. Reliant on employees following company policies for personal device usage. You can explore the supported features for devices with a Work Profile here. Management matchmaker Android Enterprise offers control over work-related apps and data across various management options. The best management option depends on your company’s specific needs, and how your fleet of devices will be used. It’s useful to take into account factors like data sensitivity, device usage scenarios, cost and convenience, and company culture. Android Enterprise also makes it simple to support different management modes across your fleet so don't hesitate to mix and match! Support for each management set depends on your EMM provider. Check with your EMM or the Android Enterprise Solutions Directory to learn more. If you found this useful, please leave a comment or kudos below. We’d love to hear what you’d look for in your management mode, and how this translates to your organization.8.2KViews5likes3CommentsSecuring your Business: Checklist for Android device offboarding
Modern workplaces are full of digital footprints. From day one, employees leave a digital trail, from corporate email accounts to VPN access and social media updates. So, to ensure a secure exit, it's vital to have an offboarding process in place. Companies must carefully decouple an employee's digital footprint to mitigate risks like data breaches and unauthorized access. To help you with this, we've created a checklist of things to consider when offboarding an employee. While the exact process will vary from organization to organization, read on for some handy tips. IT Admins: Checklist for a Secure Exit Once the employee offboarding process has been initiated, you’ll need to consider the level of remote access the employee should retain. It may be a good idea to reduce this in stages, affording the employee enough time to backup personal and corporate data appropriately. Or depending on the level of sensitivity, more immediate restrictions may be appropriate. Identify the user’s device(s): Use your MDM solution to locate the employee’s device. Limit access: If your company leverages SSO, you can immediately revoke a user's access to all apps by revoking their SSO tokens. Otherwise, you will need to consider the following: Email: Disable the user's email account. Redirect incoming emails to an appropriate recipient or archive them. Company Apps: Remove the user's access to company-specific apps, or third party apps that were previously authorized. Revoke app licenses, if applicable. Cloud Storage: Revoke the user's access to cloud storage services (e.g., Google Drive, Dropbox). Remove the user from shared folders and documents. Collaboration Tools: Remove the user from collaboration tools (e.g. Google Workspace, Microsoft Teams). Revoke access to shared documents and projects. VPN and Remote Access: Disable the user's VPN and remote access privileges. Revoke any VPN certificates or keys. Data Retention and Archiving: Determine the appropriate retention period for the employee's data and implement necessary archiving procedures. Ensure compliance with data privacy regulations. Deactivate User Account: Deactivate the user's account to prevent future access, while allowing other employees to still access any documents associated with the deactivated account. Configure Factory Reset Protection policies: To ensure a seamless offboarding process for company-owned Android devices, it's crucial to properly configure Factory Reset Protection (FRP). If you've already configured your FRP policies, you can skip to step 4. Otherwise, let's dive into the details. Factory Reset Protection (FRP) is a security feature designed to protect Android devices from unauthorized access after a factory reset. It requires authentication with the Google account last used on the device. While this is a valuable security measure, it can complicate device management, especially during employee offboarding. To ensure a smooth offboarding process, consider these two approaches: Enable Enterprise Factory Reset Protection (EFRP): Designed for Enterprise, EFRP allows you to specify which Google Accounts can activate a device that has been factory reset and locked by FRP. These approved users can unlock company-owned devices that have been factory reset, without the need for the previous user’s Google account details. This approach provides a balance between security and manageability. Disable FRP: Disabling FRP allows you to factory reset devices without requiring the previous user's Google account credentials. This can simplify the offboarding process, but it also reduces the device's security. Use with caution, particularly for devices that are at risk of loss or theft. Important Note: Resetting a device through the Settings app typically doesn't trigger FRP, except in specific scenarios involving company-owned devices with Work Profiles and EFRP enabled. Therefore, it's crucial to disable FRP or enable EFRP before initiating a factory reset to prevent potential lockouts. Remote wipe: After allowing the user a brief period to back up personal data on company-owned devices, or transfer ownership to work files, remotely wipe the device. Depending on the device’s enrolment method either: Factory Reset: For company-owned devices, instigate a factory reset to erase all work apps and data from the device without physical access. Remove Work Profile: For BYOD devices, use your MDM solution to remove the user's Work Profile from the device. This will eliminate company apps, data, and settings from the device. Note, personal data is unaffected by the removal of the Work Profile so does not require backup. Revoke device access: Deactivate the device from your MDM solution. This will prevent the device from receiving updates, policies, and security patches. Asset retrieval: Create a comprehensive inventory of all physical assets assigned to the employee (e.g., laptops, phones, keys, badges). Ensure all physical assets are returned or disposed of securely. Update device inventory: Update your device inventory to reflect the device's status (e.g. retired, reassigned). Employees: Your Role in a Secure Exit Data Backup: Use a personal cloud storage service or external storage to back up any personal data that you want to keep before the device is wiped or reset. Following your company's guidelines for data backup, ensure that all company data is backed up to the appropriate location or cloud storage. App Removal Clear the data and cache for these apps to remove any sensitive information. Uninstall any company-owned or work-related apps that you no longer need. This may include email, calendar, and productivity apps. Network Access: Disconnect from any company VPN connections. Remove any VPN profiles or certificates. Forget any saved company Wi-Fi networks. Personal Cloud Storage: Download and save any personal files from company-provided cloud storage. Revoke access to personal accounts linked to company devices. Assets: Depending on company policy, return all corporate devices and accessories to the IT department or designated location. Ensure that the device is in good condition and free of any damage. Social Media Accounts: Review and remove any company-related content from personal social media accounts. Update privacy settings to limit public visibility. Best Practices From the off, it’s good to keep handover in mind. After all, the more structure in place when setting up, the easier handover will be. With this in mind we've put together some tips and best practices to consider when starting out, or even implementing further along. Setting Up Devices and Profiles: Separate Profiles: Create separate profiles for work and personal data to improve security and privacy. Use work profiles to enforce company policies and manage company-owned apps. Corporate email accounts: The improved Android sign-up process makes it easier for IT admins to sign-up and access Google services using their corporate email addresses. This eliminates the need for personal Gmail accounts, leading to cleaner handovers when an employee leaves. Plus, certain setup tasks can be managed centrally through the Google Admin console, again making it much easier to keep track, document and handover tasks. Centralized Management Avoid the hassle of being locked out of corporate Google accounts when the time comes for the admin that set up the account to embrace a new opportunity. Maintaining a centralized approach avoids having a sole owner of any Google accounts, making it easier to manage and maintain control and access to business Google accounts in the event of a handover. IT admins can also easily track, document, and hand over administrative tasks in this way. Default Settings: Configure default settings for devices and profiles to streamline the onboarding process and ensure consistency. Consider using templates or scripts to automate device setup. App Management: Use Google Managed Play to create a customized and secure app store for different business needs and user roles and have more control over which apps employees can install and use. Policy Enforcement: Implement policies to enforce security measures such as password complexity, screen lock timeout, and data encryption. Use conditional access policies to restrict access to company resources based on device compliance. Employee Training: Remember, documented procedures and workflows are vital for mitigating risks associated with employee turnover. Proactive documentation ensures business continuity and minimizes disruptions during employee transitions. Provide employees with clear guidelines and training on their responsibilities during the offboarding process. Educate employees on data security best practices and the importance of returning company assets. Regular Reviews: Review and update your offboarding procedures regularly to ensure they remain effective and aligned with evolving security threats. Conduct periodic security audits to identify and address any potential gaps. A well-executed offboarding process is crucial for safeguarding your organization's sensitive data and maintaining security. By following the checklist provided, you can effectively mitigate risks, minimize disruptions, and ensure a seamless transition for both the departing employee and your organization. Like and share this post to help others secure their organization's digital footprint! Let us know your thoughts and experiences in the comments below. Do you have any additional tips for a smooth offboarding process?1.6KViews1like0CommentsStronger management of company-owned devices with Android 15 for business
15th October, 2024 For company-owned devices, Android 15 empowers you with advanced management capabilities to help you take control, optimize your fleet of devices, and safeguard your business – on your terms. Explore new tools to navigate the modern workplace with Android 15. Streamline eSIM management for managed devices Android 15 streamlines adding, removing and provisioning eSIMs on both company-owned devices and managed BYOD devices. Simple eSIM management* on managed devices makes it easier to onboard and offboard employees. This means IT admins can spend less time setting up eSIM devices, and more time on impactful work. *For all devices, eSIM management is conducted via the EMM. Additionally, for BYOD devices, the device’s owner is responsible for using and activating the eSIM, and the user can delete the eSIM at any point. Secure personal profiles and private spaces on COPE devices Extend your existing personal app policies to the private space on company-owned devices. IT admins have better control over the device’s security posture with a limited set of privacy preserving security restrictions* for selected apps outside the Work Profile on company-owned devices. An additional set of privacy safe security configurations for core apps will be made available at a later date. *AMAPI managed devices will have the ability from Android 15 onward. Managed configurations apply only to company-owned, personally enabled (COPE) devices. Enforce the default apps for personal profile on company-owned devices IT admins can now enforce the default dialer, messaging app, and browser* in the personal profile when setting up company-owned devices to add an extra layer of security without compromising user experience. * Available only on company-owned, personally enabled (COPE) devices. IT admins can only make an app the default if it’s already in the user’s personal profile. To ensure OEM defaults for dialer and browser are set, this feature should be configured prior to set up. Enable seamless searching for your teams with Circle to Search Forget juggling multiple apps. With new admin controls for Circle to Search* on both fully managed devices and within the Work Profile, IT can confidently empower employees to search directly from their work apps. They can simply circle, scribble, or tap content for more information. *Circle to Search requires internet connection and compatible apps and surfaces. Results may vary depending on visual matches. For Android Enterprise managed devices, the feature is available on fully managed devices and devices with Android Work Profile. For company-owned, personally enabled (COPE) devices, Circle to Search is subject to the IT admin’s ability to turn off screen capture, which will disable the feature. For employee-owned devices with an Android Work Profile, Circle to Search within the personal profile remains unaffected by IT admin policies. Available on Pixel P8, P8 Pro, P6 series, P7 series, Pixel Fold, Pixel Tablet, Samsung S24 series, S23 series (incl. FE), S22 series, S21 series, Z Flip 3/4/5, Tab S9 series, Tab S8 series. Extend battery life with screen brightness and timeout controls Android 15 introduces screen brightness and timeout period controls* for company-owned devices. IT admins can adjust settings to optimize device efficiency for frontline staff, extending battery life to help them power through a shift without any device downtime. *Available on company-owned, personally enabled (COPE) devices, fully managed devices, and dedicated devices. Read Enhanced employee and device protection with Android 15 for business next. Learn more in our Help Center FAQ. Register for the community to access and download these images and an Android 15 slide deck. How helpful will these new features be to your business? We’d love to hear your thoughts and feedback below!Enhanced employee and device protection with Android 15 for business
15th October, 2024 Flexibility and productivity go hand-in-hand in the era of modern work. But so can security risks. Designed for the modern workplace, Android 15 introduces new ways to protect company devices and shield sensitive data - for both employees and companies - wherever the working day leads. Here’s how Android 15 can strengthen digital defenses. Secure stolen devices with Android theft protection Too often the cost of theft extends beyond hardware. That’s why Android theft protection* focuses on locking down your device should it fall into the wrong hands, helping minimize the impact of stolen devices. Theft Detection Lock offers automatic protection the moment a device is stolen. It uses machine learning to detect any motion associated with theft, like snatching or driving away, and quickly locks the device to protect device data. Offline Device Lock is enabled once a device is stolen. If a stolen device is disconnected for a set period of time, the device screen automatically locks to prevent unauthorized access, even when off-grid. Remote Lock empowers employees to act quickly once their devices are gone. As an extra, immediate precaution when a device is lost or stolen, employees can lock the missing device at android.com/lock using just their phone number. *Theft Detection Lock, Offline Device Lock, and Remote Lock requires Android 10+ and an internet connection. Android Go devices are not supported. Support may vary based on your device model. The user must be using the phone while it is unlocked. All theft protection features will be available in October. Offer employees a private space within their personal profile Personally enabled devices balance convenience and usability, with enhanced controls to protect business data. Now, employees are able to create a private space* for personal profile data - a folder locked with a separate password or biometrics - to store apps containing sensitive information, like banking or healthcare. Employees can work with peace of mind, knowing that personal apps and activities are hidden and secure when working on the go or when sharing the screen with co-workers. *Private space on COPE devices are subject to the same security requirements as the personal profile. Admins will be able to block the user from having a Private Space and remove an existing Private Space in COPE. Review security logs easily with the latest NIAP logging requirements Android 15 is enhancing device security with new logging capabilities that meet the latest NIAP regulations. Administrative changes are logged and stored in the SecurityLog - and data backup events are migrated from Logcat to the SecurityLog for easier upload and streamlined management. Now IT teams can more easily identify and address potential security threats. Read Stronger management of company-owned devices with Android 15 next. Learn more about what’s new in our Help Center FAQ. Register for the community to access and download these images and an Android 15 slide deck. Enjoyed this introduction? Feel free to drop a kudos and join the discussion below - we’d love to know how these new features might impact your business strategy.4.1KViews4likes9CommentsThe open platform advantage: understanding Android open source
Have you ever wondered why Android devices and solutions are so diverse and flexible? The answer lies in its open source foundation. Let’s explore what that means, and how it impacts you and your business. What is open source? Open source refers to any program where the source code is freely available to the public, for use, modification, and distribution. Imagine a culinary world where the finest recipes are shared freely. This is the essence of open source. Android operates on a similar principle, with its core code publicly available through the Android Open Source Project (AOSP), like a shared recipe book for developers. Developers might use the AOSP to build custom variants of Android for a specific use case, porting Android to another hardware platform, such as wearables, or building Android based applications and solutions that are compatible with the wider ecosystem. When it comes to Android devices, to continue our recipe analogy, the AOSP would be the ingredients for the sauce, it provides the core flavor, but manufacturers might add extra seasoning as well as the protein, vegetables and sides that would make a full meal - not to mention the plating aka form factor. By decentralizing control, Android aims to avoid a central point of failure and empower a diverse range of players to contribute to the platform for a more dynamic ecosystem. What does that mean in real-terms? So that’s the theory, but let's break down how Android's open-source approach translates into real business benefits: More choice: The open source foundation empowers both OEMs and developers, resulting in a wide variety of devices, services and apps. For example, Google Play currently provides 2 million apps to billions of people worldwide. Our diverse partner ecosystem means businesses can easily tailor their Android devices to create unique user experiences that meet specific needs. Flexible solutions: If you can’t find the solution you need, you can always build it. The ability to customize and integrate Android with your existing systems unlocks a whole new level of flexibility. You're not limited to pre-built solutions; you can tailor the platform or solution to perfectly match your unique workflows. And Android Enterprise tools make it easy to distribute and manage custom enterprise apps just like any other Android app, without having to sideload. Future-proof technology: An open and competitive landscape drives innovation. So technology with Android at the core is often at the forefront of technological advancements. With such a vast and active developer community driving advancement, emerging technologies are swiftly integrated into the ecosystem. Budget friendly: Without high operating system license fees, manufacturers can build mobile devices at lower costs. Plus, more variety and market competition means a variety of price points suitable for every budget. Currently, businesses can choose from more than 24,000 Android device models at prices starting at just $50. How does open source impact security? Android offers robust security measures that are tested, certified, and designed to defend at scale. While the open-source model might raise initial questions, it actually enhances security in many ways. A large community of developers, security researchers, analysts, academics and even government agencies are constantly scrutinizing the code. This feedback accelerates security advances and drives the prompt release of security patches and updates to keep devices ahead of emerging threats. When combined with Android's multi-layered security, including strict hardware requirements, a secure operating system, built-in malware detection, robust policy controls, and a zero-trust approach (which requires strict verification and authorization for access), the result is industry-approved, regulation-certified protections for businesses. It’s also important to recognize that while Android's open-source nature allows anyone to view and adapt the source code for their own use, contributions to the official Android platform are tightly controlled and subject to rigorous guidelines, testing and approvals, ensuring the highest security standards are maintained. How open is Android? While the AOSP empowers individuals and organizations to create custom versions of Android for their own devices, Google maintains overall control of the platform's design and direction to ensure a consistent user experience across different devices. Google's approach to development involves releasing stable builds before making the source code publicly available. While anyone can use and modify the AOSP code, contributing directly requires adhering to specific standards and criteria. This ensures that changes to the core operating system align with Google's vision and maintain the platform's integrity. To be considered Android compatible, devices must also meet specific requirements, including the ability to run APK files. Only compatible devices can license Google’s suite of popular apps like Chrome, Google Play Store, Google Maps, and YouTube (GMS), and the Google Security Services like Google Play Protect and Safe Browsing. These proprietary elements complete the Android experience. Open source at work Healthcare: Android-powered devices are used in hospitals to manage patient records, monitor vital signs, and facilitate telemedicine. The open platform allows for rapid development of new medical apps and integration with existing healthcare systems. Retail: From point-of-sale systems to inventory management, Android devices are transforming the retail industry. Retailers can create custom apps to enhance customer experiences, improve operations, and increase sales. Manufacturing: Android-based tablets and wearables are used on factory floors for quality control, maintenance, and logistics. The flexibility of the platform enables businesses to develop tailored solutions to optimize production processes. What do you think? Feeling excited about the possibilities? Android Enterprise leverages the power of open source to help businesses of all sizes stay agile, go further and get ahead. Are there any key things that this open source approach has enabled you to do? It would be great to hear from you. Drop a Kudos and share your thoughts below.2.2KViews3likes0CommentsTaming the tech jargon: your guide to enterprise mobility acronyms
Let's face it, the world of enterprise mobility is full of acronyms that can make anyone feel like they're lost in a sea of letters - yet alone if you're new to this space. So, to help you get to grips with the basics, and navigate this exciting space with confidence, we’ve put together a glossary of some of the most common acronyms used across the industry - grouped into themes and arranged alphabetically. If you've come across any others, please do share them below and we will add them to this community curated list. Device management DAP (Device Administration Policy): the configuration settings and security policies enforced on managed devices. EMM (Enterprise Mobility Management): a broader solution that includes MDM capabilities (see below), as well as managing mobile applications and content to ensure security and compliance. Depending on the context, sometimes this is used interchangeably with MDM. GMS (Google Mobile Services): a suite of Google’s most popular apps and APIs that help support functionality across devices. This is usually pre-installed on Android devices. MAM (Mobile Application Management): is the process of managing applications on mobile devices, including deployment, access control, and security policies. MCM (Mobile Content Management): the process of securing and securely distributing corporate content to enterprise devices. It’s like a secure library for your work device. It ensures company documents and files get to the right people safely. MDM (Mobile Device Management): refers to IT admins managing and securing mobile devices like smartphones, tablets and laptops in the workplace. MIM (Mobile Identity Management): provides secure authentication and authorization for mobile devices and applications. OEMConfig (Original Equipment Manufacturers configuration): a standard defined by Google that helps OEMs and EMMs build and support features in a uniformed and consistent way. OTA (Over-the-Air): refers to delivering software updates, configuration changes, or content wirelessly to mobile devices. Think, automatic improvements for your work phone or tablet, delivered wirelessly. SMP (Smart Device Management): less common alternative for MDM, so if you do see it being used, think managing and securing mobile devices. UEM (Unified Endpoint Management): extends EMM to manage all endpoints, including desktops, laptops, and other connected devices. ZTE / ZT (Zero-touch enrollment/ zero-touch): an Android Enterprise feature that allows IT teams to deploy any number of company-owned devices at once, without manual configuration. All the apps and configurations that employees need will be ready to use, and the devices can be directly shipped to their door. All they need to do is open the box and get started. ZTP (Zero-touch provisioning or zero-touch deployment): a method of setting up and deploying new devices remotely, without IT admins having to manually configure the devices. I.e. setting up a device with zero touch. Management modes BYOD (Bring Your Own Device): lets employees use their own phone or tablet for work, but with some security rules. COBO (Company Owned Business Only): the device is entirely managed by the company. It’s intended for company-owned devices that are used exclusively for work purposes. COPE (Company Owned Personally Enabled): employees are provided with a company-owned device, but it’s not locked against personal use. COSU (Company Owned Single Use - now referred to as Dedicated Device): the company provides a pre-configured device that is dedicated to one purpose, like check-in desk or digital signage. CYOD (Choose Your Own Device): employees are able to choose from a list of approved devices for work, like picking a company car. DO (Device Owner): A device that's managed by the enterprise, usually by means of a Device Policy Controller (DPC). DPC (Device Policy Controller): An app that controls local device policies and system applications on devices. PO (Profile Owner): A managed corporate profile associated with the primary user account on an Android device. A work profile separates work apps and data from personal apps and data. Security GPP (Google Play Protect): a malware detection and defense service. GPP automatically scans all of the apps on Android phones and works to prevent the installation of harmful apps. Think security guard for your Android device. MFA (Multi-Factor Authentication): requires users to provide multiple verification factors to access an application or system. It adds an extra layer of security to your work login, like needing a code from your phone on top of your password. SAML (Security Assertion Markup Language): a standardized way for apps and services to recognize a user is who they say they are. It’s like a universal membership card that lets you sign in to multiple apps from logging in to your main company login once. SSO (Single Sign-On): SSO is made possible by SAML. It lets you access multiple applications with one single login. VPN (Virtual Private Network): encrypts internet traffic and helps users securely connect to a private network over a public internet connection. It’s like a secret tunnel for your internet traffic, keeping it safe from prying eyes. Other AAB (Android App Bundle): a new, more efficient app publishing format. AABs contain all the code and resources needed to build an APK (see below), but they are packaged more efficiently. Instead of downloading one giant app file, AABs only include the code and resources needed for a specific device configuration. This results in smaller app downloads and faster installation times. API (Application Programming Interface): a mechanism that helps different software applications communicate with each other using a set of rules and protocols. It's like a translator between different programs, allowing them to share information smoothly. AMAPI (Android Management API): a specialized API designed for managing Android devices. It’s a tool for IT admins to manage Android Enterprise devices without needing a separate app installed on each device. APK (Android Package Kit): also known as Android Package or Android Application Package, an APK is a file format used to distribute and install apps across Android’s ecosystem. Think of it like a zip file that includes all of the data, files, resources and code an app needs to run properly. IoT (Internet of Things): a network of physical devices embedded with sensors, software, and other technologies that connect and exchange data to be used in different applications. MGP (Managed Google Play): an enterprise version of the Google Play store that gives IT admins more control over which apps employees can access. IT admins can remotely configure and distribute private, public, and web apps within Managed Google Play. OEM (Original Equipment Manufacturer): creates components or devices that other companies use to build their final products. For instance, Samsung might be the OEM that manufactures the screen you see on your phone, even though another company designed and sells the phone itself. Or Samsung’s devices can be sold through a VAR within a phone package. VAR (Value-added Reseller): a retailer who takes something someone else makes (like an OEM phone) and adds their own twist. They might bundle it with additional services (like a phone plan) or sell it with their own branding or customizations. By no means is this an exhaustive list, but it covers some of the most common acronyms used. Let us know if there’s anything else you want to see on here. We’ll do our best to keep this updated and relevant so feel free to subscribe or drop a Kudos. TTFN (Ta Ta For Now)4KViews3likes1CommentNavigating the Android Enterprise ecosystem: partner types and resources
If you're new to deploying and managing Android solutions in your business, you might be wondering who all the players are. The good news is, there's a whole ecosystem of partners ready to help you every step of the way. Let's break down the different types of Android Enterprise partners and how to find them. The Partner Landscape Android Enterprise involves a network of partners offering various solutions and expertise. These include: EMM (Enterprise Mobility Management) providers: These are the tech wizards who provide the software platform to manage your Android devices. They handle tasks like security configuration, app deployment, and device wiping. Device Manufacturers: From household names to niche players, these companies build the Android devices your workforce will use. Mobility consulting services: These partners offer additional services beyond the core functionalities, like mobile device management (MDM) consultations, security assessments, and even app development tailored for your business needs. Carriers: They provide the cellular network connectivity that keeps your employees connected and productive. Device Resellers: These are your one-stop shops for purchasing the right Android devices for your company, often bundled with service plans and support. Beyond a Badge With a variety of different players, it can be difficult to know who to trust with your business needs. That’s why Google has created two ways to distinguish partners: Android Enterprise Recommended: Not all solutions are created equal, especially for businesses. This program identifies devices and services that meet Google's highest standards for enterprise use. How it works: Beyond a simple stamp of approval, Android Enterprise Recommended is a curated selection of devices and solutions that meet Google's strict enterprise requirements. What makes them different? Built to Last: Android Enterprise Recommended devices boast extended lifespans, ensuring your investment lasts the long haul. Effortless Management: Standardized features streamline deployment and management, making it easier to scale your fleet. Google-Backed Expertise: Every Android Enterprise Recommended partner receives comprehensive training and support directly from Google. What it means for you: Guaranteed enterprise-grade features and expertise in devices and solutions. Standardized management features for easier fleet scaling. Android Enterprise Partner Program: Our Partner Program connects you with pre-approved, trusted partners and their proven solutions. How it works: We put partners through the paces to ensure they meet the requirements across Partner Expertise, Product Excellence, and Proven Performance. Partners meeting the core requirements across these three pillars earn a Silver Badge, while those exceeding expectations achieve a Gold Badge. What it means for you: When you choose a validated Silver or Gold partner, you gain peace of mind. You're working with a team that's been vetted for its ability to: Deliver technical solutions and features effectively. Provide exceptional customer service. Demonstrate a history of success in the market. Finding the right Partner Ready to connect? There are a couple of key resources to help you discover the perfect partners for your Android Enterprise journey: The Android Enterprise Solutions Directory: This online directory is a treasure trove of information. You can filter by product type, so it's a great place to start your research, compare options, and find Google validated products. Android Enterprise Customer Community: Connect with other users and get recommendations for partners, based on their experiences and expertise. Considerations The ideal partner depends on your specific requirements. Here are some factors to consider: Your Needs: Are you looking for a basic MDM solution or a more sophisticated security platform? Do you need help with device deployment or ongoing management? Company Size: Larger companies might require a full-service partner with extensive experience, while smaller businesses might prefer a more focused solution. Budget: Partner solutions vary in cost. Consider your budget and prioritize features that align with your needs. If you’re just starting out, these community tips for what to consider when choosing an enterprise mobility management solution are worth a read! We’re here to help The customer community is a wealth of knowledge, with thousands of members that are either going through, or have gone through this journey ahead of you. If you have a specific query or simply want to get some advice, don’t hesitate to make a post. Remember, the right partner can empower your mobile workforce and unlock a world of productivity and security. If you found this interesting don’t hesitate to drop a kudos, or save this post for later reference. We’d also love to know what else you would consider when finding your perfect partner - let us know in the comments below!8.3KViews4likes0Comments[New Blog Post] How Android Enterprise helps businesses prepare for the next generation of the workforce
As the growing Gen Z workforce reshapes the workplace, it's crucial for IT leaders to understand their unique priorities. We surveyed 1,000 Gen Z employees in the U.S. and UK to understand their technology and workplace preferences. The results? Gen Z values productivity, privacy, and work-life balance—making AI-driven tools and flexible work options essential for the future of work. Check out our blog post for the top 5 takeaways to empower Gen Z employees and boost workplace productivity with Android Enterprise.808Views0likes3Comments[Event] How Gen Z is Changing the Way We Work - Join Android Talks!
Hi everyone, I'm thrilled to invite you to the second episode of our new digital series: Android Talks Productivity! Gen Z is transforming the workplace, and we're diving deep into how their unique approach to productivity is shaping the future of work. In this episode, you’ll Explore Gen Z Insights: Discover how their unique approach to productivity is reshaping the way we work Unlock Productivity with Android: Learn how Android Enterprise empowers Gen Z to boost productivity with AI and create work life boundaries all while maintaining security Gain Actionable Recommendations: Get tips to support Gen Z employees and foster a productive work environment Join us as we explore how to leverage mobile technology to empower the next generation of talent! Android Talks Productivity September 30, 2024 8:30 am - 8:50 am PDT To register for this event, please visit the event page here. We can't wait to see you there! [Please note, by clicking RSVP here in the community, doesn't register you for the event]1.6KViews5likes1Comment[Resource guide] Android zero-touch enrollment for IT admins just starting out
So, you’re newly set-up with Android zero-touch and are excited to dive into the world of remote deployment greatness. The possibilities are swirling, but you might be wondering where to start. If this sounds familiar, we’ve collated a few tips and resources to help you get started. 1. Make sure your account is set-up correctly You may have already provided your reseller with a Google account associated with your corporate email and they’ve used this to set up your account, but if not, you may find this section on how to associate a Google account helpful. We recommend using a corporate account with the zero-touch portal rather than a personal Gmail account for better security and management. Just below, the zero-touch enrollment for IT admins article also has a section on how to link your account with your enterprise via the zero-touch iframe. For an overarching step by step on this set-up process, check out this zero-touch enrollment set-up video. 2. Familiarise yourself with the portal Your reseller will have provided you access to your zero-touch enrollment portal, alongside some documentation specific to them. Explore the portal and use this documentation to locate key functionalities like device management, configuration creation, and enrollment options. 3. Verify Device Registration Use the portal to confirm that the purchased devices are correctly registered for zero-touch enrollment. This typically involves checking using hardware identifiers like IMEI numbers. If any device is missing, contact your reseller to ensure registration. 4. Create Configurations Design a default configuration profile for new devices using the portal tools. This profile should include settings like WiFi connectivity, security policies, app installations, and device restrictions. You can create additional profiles for different device types or user groups later. Explore how to add and assign device configurations here. 5. Test, refine and troubleshoot Test your configuration on a selected device before wider deployment. For some light troubleshooting, take a look at this community guide created by jasonbayton, which provides a helpful intro to zero-touch, with some pointers for troubleshooting. If you’re able to view your device in the portal, but it doesn’t go through provisioning in the setup wizard, our Android team has put together a simple troubleshooting flowchart for you to follow. Otherwise, the zero-touch enrollment for IT admins article in the Help Centre offers details around set-up and use, so make sure you’ve followed each step appropriately and check the troubleshooting section toward the end of the article for what to do if your device doesn’t provision itself out of the box, or is being included in zero-touch when it shouldn’t be. 6. Other Resources Once you’re up and running, it’s good to set user expectations. For general understanding this zero-touch video overview is a great resource to share with colleagues. You may also want to share this zero-touch enrollment for users article with employees for further support setting up or troubleshooting their enrolled device. Let us know if you come across any other useful resources when starting out with zero-touch in the comments below - the community thanks you! Have questions that aren’t covered? Search the community for answers, or ask a question here.14KViews6likes2Comments[Video Guide] Manage Android apps for work with Managed Google Play
New to Android Enterprise and app management? Discover the magic of Managed Google Play! In our last video, we introduced Android Enterprise. Now, let's focus on Managed Google Play. We'll explain in simple terms what it is, and how it can help you: simplify app deployment and management enhance app security control which apps employees can access Imagine having a customized and secure app store tailored to your business needs. With Managed Google Play, that's a reality! Check out this video and take the first step toward creating a unified employee app experience. What do you think? Drop us a kudos or comment to share your thoughts. Want to know more? Let us know what Android Enterprise topics you'd like us to cover next.5.1KViews5likes1CommentManaging Google system updates with Android Enterprise
It's more important than ever to keep your fleet of devices secure and optimized for work. That’s where Google system updates come into play. Delivering updates from Google to the Android operating system, Google Play Store, and Google Play services, Google system updates make your Android devices more secure and reliable, whilst introducing new, useful features. But these need to be delivered in a timely way that works for your business and employees. So with that in mind, let’s cover the two main tools that can help you manage your Google system updates. System update policies Ideal for: Dedicated devices Pros: Keeps devices up-to-date, without relying on end-users to accept update prompts. Context: Between kiosk mode and digital signage, some devices are constantly running, and don’t necessarily have an assigned end-user to accept update and reboot prompts. In these cases, system update policies offer the perfect solution. They update the device either as soon as the update becomes available, or during a pre-set maintenance window to avoid active hours, so devices remain up-to-date and secure, without user input. There are also options to postpone updates, and freeze updates for a set period for particularly busy times of the year. Google Play system updates (also referred to as Mainline updates) are automatically downloaded as soon as they become available, but are not installed until the next device reboot - whether that’s prompted by user, admin or policy. Compliance policies Ideal for: Knowledge workers Pros: Gives users the flexibility to update on their own terms, whilst making sure devices don’t fall out of compliance. Context: For devices that are assigned to a user, pushing updates as soon as they become available may not always be practical. There’s nothing worse than joining an important client-call flustered and embarrassingly late, after an ill-timed system update. But, then again, companies want to make sure they’re making the most of the new features and security patches that come with each update. Compliance policies offer a balance between security and usability. They ensure that devices remain current against a pre-set standard, whilst giving workers the flexibility to apply updates at a time that suits their work schedule. The device will be tested according to certain signals, such as when the last update was made, or what version OS is being used, and prompt the user to update within a certain time-frame. Next steps These policies can be layered to make sure updates across your fleet are handled securely, in a way that works for your business. For more details on these tools, check out this Help Centre article. You can see what’s new to Google System update policies here. Make sure to also explore the documentation from your EMM provider for support on how these tools can be configured. Let’s get those system updates up-to-date! Have you got a system in place to manage updates? Does your business use one of these methods or a combination of the both? Let us know if and how you leverage these tools - we’d love to hear how they work for you!3.5KViews4likes3Comments[Product Update] Dynamic duo: improved dual-SIM support in Android zero-touch
Note: this article has been updated on 03.04.2024 to reflect improvements to the process of provisioning dual-SIM devices via zero-touch. Please see the below steps for best practice. As individual tools, both zero-touch enrollment and dual-SIM devices offer a wealth of business benefits. But until recently, the two IMEI numbers - one for each SIM card - in a dual-SIM device meant integrating dual-SIM with zero-touch was unreliable and dependent on SIM configuration. The good news: we’ve enhanced dual-SIM support in zero-touch, improving the reliability of dual-SIM enrollment, and simplifying management. What does this mean? This improved integration addresses the known issues some users have previously experienced when provisioning dual-SIM devices with zero-touch. It means dual-SIM devices don’t need to be registered as two separate devices to be reliably managed. It also minimises the risk of devices being missed during provisioning and getting stuck in a reset loop, or randomly undergoing factory reset. There is no action required to activate this fix, and you’ll only be visibly impacted if you’ve experienced the issues above. Otherwise, we’d recommend you continue to follow the steps below as best practice. Here's how it works: Lead with the lowest IMEI: For zero-touch to recognise and configure dual-SIM devices, the device initially needs to be registered with the numerically lowest IMEI. For example, if the two IMEI numbers are 000000000000001 and 000000000000002, you would register the first. Zero-touch to go: Upon boot up zero-touch will detect the device and provision it, applying your preconfigured settings and apps. Cue smooth sailing. Tips for a smooth two-step Be aware: If your device is preinstalled with a version of Google Play Services prior to 24.07.12, after setup zero-touch will detect the device, register its serial number, and prompt a factory reset. The next time you set up your device, it will be provisioned through zero-touch. Communicate with your reseller: Make sure they understand the importance of registering with the lowest IMEI for dual-SIM devices. Test, test, test: When integrating dual-SIM devices with zero-touch, begin with a test batch to identify and troubleshoot any hiccups. You may also wish to check this documentation for any known issues. Documentation is key: Clearly document the specific steps for dual-SIM zero-touch deployment so users know what to expect when setting up. For more details including prerequisites, configurations and a getting started guide, check out this zero-touch enrollment for IT admins article. Now, it's your turn to share your thoughts. Do you currently use a dual-SIM device? If so, how do you use it? Was it provisioned through zero-touch?6.9KViews4likes19Comments[Customer Story] How Android Enterprise works for this healthcare provider
Home healthcare provider Amedisys reduces device provisioning time by 50 percent with Android Enterprise. We’re constantly blown away by the real-world impact that Android Enterprise can have on a company, and that has never been more true for Amedisys - a leading provider of home healthcare services. As a healthcare provider, security is a top priority for Amedisys, which is why all of the inherent security features of Android Enterprise made it the obvious choice. By switching from an in-house solution, to the easy to adopt, and simple to manage Android Enterprise, Amedisys have been able to: Reduce onboarding time by 50% Enhance security with Android Enterprise's built-in features Give caregivers easy access to the information they need Streamline workflows and communication In fact, when it comes to getting new caregivers equipped with their Android devices, they “only need one person to manage it, and it only takes about 30 minutes” - ideal for their surprisingly lean IT team. Explore all the ways Android Enterprise has helped Amedisys grow in their own words, on our Android Enterprise blog. Special thanks to @travisreeves, Systems Administrator at Amedisys and community member, for sharing his experience. As a community bonus, he’s kindly agreed to answer any questions you may have - whether that’s about getting started with Android Enterprise, or learning from Amedisys' journey. Please ask away 👇1.9KViews6likes3Comments[Product Update] Lock and locate Corporate devices with Lost Mode
Lock lost corporate devices and get real-time location updates to recover them. Android Enterprise admins, have you discovered Lost Mode? It’s a new management feature designed to safeguard your organisation's data and recover misplaced devices. No more frantic "phone-finding" missions or compromised sensitive information - Lost Mode empowers you to take control in challenging situations. Lost Mode empowers device management through: Remote lock down: Instantly lock lost or stolen devices. Gone are the days of helplessly hoping lost devices remain untouched; Lost Mode helps prevent unauthorised access beyond incoming and emergency calls, securing your data, and peace of mind. If the need arises, enrolled devices can also be remotely wiped. Real-time location tracking: Track the location of a lost device in real-time. Whether nestled under a colleague's desk or left in a taxi, Lost Mode can remotely pinpoint a device's whereabouts for hassle-free recovery. Lock screen message: Communicate company contact information directly on the lock screen. If found by a passerby, the pre-set company message will tell them where to return it. Or they’ll have the option to ‘Call owner’ on your chosen contact number with a press of a button, making good deeds a breeze. Audible locator: Turn your device into a beacon. When Lost Mode is activated, the device begins to ring on full volume, guiding you, or a helpful passerby, towards its hidden location. It’s a step up from breadcrumbs or wasting time aimlessly retracing your steps - follow the audible trail and reclaim your missing tech. How does it work? IT admins can easily put a device into Lost Mode from their EMM console. Once the missing device is found, and is back in the right hands, employees can simply exit lost mode with their device passcode and resume business as usual. Or, IT Admins can exit Lost Mode from their EMM console. Beyond immediate recovery, having this security measure in place enables quick action, minimising the risk of data breaches, improving employee peace of mind and eliminating wasted time searching for misplaced devices. Next steps Lost Mode is exclusive to EMMs that use Android Management API, and is currently available for both Work Profile on company-owned devices running Android 13 or later, and fully managed devices on Android 11 or later. To check if this feature has been made available in their console, please contact your EMM. For a step by step on how to enable Lost Mode on company-owned devices, check out this article in the Help Center. Otherwise it would be great to hear from you, have you or do you plan to implement Lost Mode into your device strategy? Which feature do you think will be most useful?