Android is also unusual -- compared to the more restrictive iOS -- in that it makes it possible for users to easily access a device's full file system, like you could on a computer. A simple file manager like Cabinet Beta allows you to browse your phone's folders, manage locally stored files, and share local data with any available app or destination
VPN and remote connection
Maintaining a secure connection is critical for users conducting business while on Wi-Fi. Cisco's AnyConnect app provides VPN connectivity for enterprises with Cisco relationships, while the Opera Software-owned SurfEasy app offers a simple and secure option for smaller companies that may not have enterprise-level licenses.
For remotely accessing desktop computers from an Android device, meanwhile, Microsoft Remote Desktop and Citrix's GoToMyPC are worthwhile choices to consider. Google's Chrome Remote Desktop may also work for smaller businesses with more basic requirements.
Some robust security protections are baked into Android itself at the system level these days, but enterprises may want to encourage users to take advantage of a few additional tools that can boost the caliber of protection around accounts and devices.
A password management app like LastPass allows people to maintain unique and proper passwords for every site and service they use -- securely, and without having to rely on their own fallible brain-memory -- while a two-factor authentication program like Authy (or the less versatile but equally effective Google Authenticator) lets you create an important second layer of security for critical accounts.
Finally, Google's Android Device Manager is a must-have for any user embracing Android -- enterprise or otherwise. The app lets you remotely locate and ring any devices associated with your Google account and optionally lock them, reset their PINs, or fully wipe and reset them. The service can be accessed from any Android device (even one that isn't your own, like a colleague's) as well as from any desktop computer.
But make sure every device is enrolled in the system and ready to be located before the need arises.
Sign up for Computerworld eNewsletters.