Citrix Receiver (Free)

1 of 10

Citrix Receiver (Free)

If your business uses Citrix Receiver, employees can use this app to check email, review documents, tune into project dashboards and approve expenses from any iOS device.

2 of 10

Divide (Free)

This secure private workspace, which can securely sync email, contacts and calendar with Exchange, Lotus Notes or Gmail, can be remotely managed by IT professionals.

3 of 10

MokaFive (Free)

A file-browsing and data-sharing app for iOS devices, users can view files, cache them locally for offline use through an encrypted container, and the app can be secured and managed by the company's IT department.

4 of 10

ZenWorks (Free)

This app connects your iOS device to the company's ZenWorks mobile management server, with automated security settings, shared access across devices and regulated access to corporate information.

5 of 10

Mobile Fusion Client (Free)

Developed by BlackBerry maker Research In Motion (RIM), this app lets admins deliver configurations, policies, WiFi and VPN settings to the device to keep work information synchronized and secure.

6 of 10

Avaya one-X Mobile SIP (Free)

Delivering enterprise Avaya Aura telephony capabilities to the iPod touch, iPhone and iPad, this app turns iOS devices into company call center.

7 of 10

iPass Open Mobile for iOS (Free)

Connect to more than 780,000 WiFi-enabled venues in 121 countries, including 97 of the world's top 100 airports, with a single username and password.

8 of 10

AirWatch Secure Browser (Free)

A secure alternative to the Safari browser on iOS devices, corporate IT admins can customize and configure the browser to meet unique business or end-user needs.

9 of 10

SOTI MobiControl (Free)

This app offers centralized control of mobile devices, real-time support and enhanced tracking over any network, and requires the configuration of a server side component to function, giving the IT department more control.

10 of 10

Afaria (Free)

Afaria enables IT organizations to centrally manage, secure and deploy iOS devices for enterprise use, and can determine if a device has been compromised, and runs a series of tests to determine so.

Top White Papers and Webcasts