Mobile device management is no longer an option. Half of the workforce is expected to use smartphones by this year, and while using mobile devices presents undeniable advantages, helping employees stay connected anywhere, anytime, there is also increased security risk. Here's what you need to know about mobile device management in the enterprise.
TAKE OUR SURVEY: https://www.surveymonkey.com/s/MobileSurvey2013
1. What is mobile device management?
Mobile Device Management (MDM)
software secures monitors, manages and supports mobile devices deployed across
mobile operators, service providers and enterprises. MDM functionality
typically includes over-the-air distribution of applications, data and
configuration settings for all types of mobile devices, including mobile
phones, smartphones, tablet computers, ruggedized mobile computers, mobile
printers, mobile POS devices, etc. This applies to both company-owned and
employee-owned (BYOD) devices across the enterprise or mobile devices owned by
consumers.
TAKE OUR SURVEY: https://www.surveymonkey.com/s/MobileSurvey2013
1. What is mobile device management?
Mobile Device Management (MDM)
software secures monitors, manages and supports mobile devices deployed across
mobile operators, service providers and enterprises. MDM functionality
typically includes over-the-air distribution of applications, data and
configuration settings for all types of mobile devices, including mobile
phones, smartphones, tablet computers, ruggedized mobile computers, mobile
printers, mobile POS devices, etc. This applies to both company-owned and
employee-owned (BYOD) devices across the enterprise or mobile devices owned by
consumers.
By controlling and protecting the data
and configuration settings for all mobile devices in the network, MDM can
reduce support costs and business risks. The intent of MDM is to optimize the
functionality and security of a mobile communications network while minimizing
cost and downtime.
The MDM market is evolving rapidly,
meaning vendors that previously had first-mover advantage have had to evolve to
support new platforms and the enterprise's shifting needs. In addition, new
disrupters have tried to enter the MDM space with repurposed product, primarily
from adjacent markets such as mobile services management (MSM), mobile security
(endpoint/VPN), and telecom expense management (TEM).
Regardless of its origin, the complete
MDM solution should address the complete enterprise mobile security, device,
data and app life cycles.
Securing enterprise mobility with MDM
typically involves four primary phases.
- Phase 1 focuses on provisioning, during which devices "inherit" an enterprise persona, as determined by the mobile IT and security staff in charge of enterprise mobility. This phase includes leveraging all existing corporate network infrastructure to help avoid resource complexity and duplication.
- Phase 2 involves the mobile IT team actively managing all devices -- phones, tablets, iPod Touches, etc. -- to help ensure the original enterprise persona remains intact. At this point, users are given wide-ranging access to corporate resources, including apps, email, secure directories and even cloud-based file storage. Ideally, the mobile IT team has also published a corresponding "declaration" to its mobile users, outlining what is permissible (e.g., using your device for non-business gaming) and what is not (e.g., downloading a virus-laden open-source game).
- In Phase 3 mobile IT is now responsible for managing mobile apps for business users. In this phase, mobile IT management must address a nearly infinite variety of apps, devices, personas and operating systems. MDM helps solve this complex set of issues, including the ability to deliver a private, company-specific enterprise app storefront. This corporate application library is discoverable and provides both the tightest security and best end-user experience for the distribution, inventory and delivery of mobile applications companywide.
- Last, Phase 4 of the continuous MDM software life cycle has users limiting their costly mobile service plan overages with the help of MDM software application programming interfaces (APIs) designed to detect and reduce international plan overages. Of the millions of the Fortune 1000 enterprise users depending on MDM software, a majority of them experience international plan overages measured by $10,000 or more per month.
3. How
much does an MDM platform cost?
That
depends. Currently, 1000 mobile devices require on average 4.0 FTEs to
manage. Right
now, most companies still use on-premise MDM platforms which are more expensive and time consuming for IT. According to an Osterman Research survey, the current IT labor cost for MDM was $229 per user in 2011, $294 in 2012, and is expected to reach to $339 in 2013. This rise of 48 percent in two years is largely attributed to BYOD. However, since 31 percent of organizations that currently uses an in-house platform plan to switch to a cloud-based platform within the next year, the price per device cost of MDM will likely start to drop. As far as software prices can range from $0.99 to $9.00 per device depending on options capabilities and number of devices.
now, most companies still use on-premise MDM platforms which are more expensive and time consuming for IT. According to an Osterman Research survey, the current IT labor cost for MDM was $229 per user in 2011, $294 in 2012, and is expected to reach to $339 in 2013. This rise of 48 percent in two years is largely attributed to BYOD. However, since 31 percent of organizations that currently uses an in-house platform plan to switch to a cloud-based platform within the next year, the price per device cost of MDM will likely start to drop. As far as software prices can range from $0.99 to $9.00 per device depending on options capabilities and number of devices.
4. What
are the benefits of having an MDM solution?
- Extend IT systems management polices to mobile devices, including iPhone, iPad, BlackBerry and Android phones and tablets
- Protect business data no matter where it sits or is accessed from
- Reduce help desk requests such as mobile email configuration through remote and automatic management capabilities
- Manage all devices from desktops and servers to mobile devices from a single pane of glass for consistency and transparency throughout the organization
- It could be running one of hundreds of different variations of OS platforms and versions.
- It could be used for personal and business use and will likely have dozens of apps installed over its lifetime.
- It will be used to access and store private corporate documents and emails.
- It will likely have a camera and will be used to post content to a social networking site.
- It may get connected to Bluetooth peripherals or be used as a wallet or security access badge thanks to NFC.
- It will roam onto insecure WiFi networks, and may be accidentally forgotten on a restaurant table or left in a cab.
- It may be passed around to friends and family members, including young children, to use or play games.
- Its owners may be any one of your employees, including a C-level executive.
6. How
do I get started with an MDM strategy?
A good enterprise mobile strategy should help an
organization incorporate new business processes, optimize costs, define a clear
mobility vision and roadmap for the future and minimize risk. The key elements
of such a strategy include:
A holistic mobility
framework
A holistic mobility framework cannot exist in silos.
It must take into consideration business demands and IT requirements. It must
include a plan for managing not only devices but also enterprise applications
that run on those devices. A recommended first step is to participate in a
mobile assessment. Among many considerations organizations need to evaluate
are:
- What current IT investments need to be preserved?
- Which cost-effective mobile applications make most business sense to develop?
- How do you secure devices, data and apps?
- What access and storage boundaries must be created to protect “crown jewel” systems and enable easy access to low-risk threshold applications?
- What type of policies, governance and support do enterprises need when offering new mobile device technology?
Strong security
policies
Although the latest
mobile platforms are built with security in mind, they may be ineffective when
it comes to protecting enterprise assets that run on devices targeted at the consumer market. What complicates mobility is the fact that currently mobile devices operate with an environment that is often times not within the control of enterprise IT.
it comes to protecting enterprise assets that run on devices targeted at the consumer market. What complicates mobility is the fact that currently mobile devices operate with an environment that is often times not within the control of enterprise IT.
There is regular
interaction with third party applications whose security position is virtually
unknown to the IT department. For instance, many employees sync mobile devices
with their home PCs to back up personal data or important device settings, or
employees use a public cloud-based service for transferring or storing data. In
both scenarios, sensitive corporate data lies outside enterprise firewalls and
other protective systems. It is exposed to web-based and network-based attacks
or malware threats. A strong security policy can help minimize these security
threats.
Enterprises must
seek security solutions that offer advanced security protection and can quickly
thwart evolving security threats. Another important approach to mobile security
is to establish strong password protection policies. Data encryption technology
must be utilized to safeguard any sensitive data that is loaded on mobile
devices. Security threats can also be reduced by enforcing compliance-based
security policies that secure corporate content by remotely tracking, locking
and wiping data on the mobile devices.
Full lifecycle
device management
Gartner advises organizations to embrace “managed
diversity”. Managed diversity is an MDM approach that enables IT to secure and
optimize a wide range of consumer devices beyond just Apple iOS devices. This
includes, but is not limited to, Android devices, Windows Mobile devices, and
BlackBerry devices. In turn, these devices are securely enabled for practical
business use, whether through email, apps or document exchange.
While it is not easy to accommodate mobile devices
into standard IT environments, the following processes can ease the transition
that is an essential part of the change.
- Look for common approaches and consistency, from multiple devices to multiple apps and multiple points of services. This will help provide a single and consistent end-user experience.
- Establish a minimum level of capabilities a device must provide. Not all older devices can be supported with similar security.
- Establish procedures for procurement and servicing of devices as well as streamline device deployment and provisioning. Provide self-service provisioning whenever possible.
- Black-listing and/or white-listing mobile apps should be considered based on security needs.
- Streamline and automate mobile asset and inventory management
- Give users a single service desk to access help quickly with any end point device (PC, phone, PDA, or tablet).
Alternatively, organizations can partner with vendors to provide
and implement MDM tools that will give organizations an integrated real-time
view of all mobile devices deployed across the organization. A vendor with the
right experience and expertise can also help organizations develop policies
that are well suited to their business.
7. What
do users need to know about MDM?
Knowing
that you can meet the core security needs of your designated list of platforms
is a great start: the sheer number and quality of options already available
should help IT managers breathe a little easier.
The
next few steps on that journey are all about figuring out what type of
management -- and how much -- you actually need. The specifics can vary dramatically
from one type of business to another and even from one job function to another
at the same company. Identifying those specifics accurately can make selecting
and implementing an MDM strategy easier and will deliver better results.
8. What
are some good resources for finding MDM help?
More
companies offering MDM solutions are popping up all the time and it can be a
hassle finding out which one will work best for you. Luckily, Gartner did the
work for you, compiling a list of some of the industry’s top MDM
vendors.
So “Once more unto the breach, dear friends, once more;”
About Rick Ricker
Source(s):
- http://www.computerworld.com/s/article/9224894/Tips_for_developing_a_mobile_device_management_strategy
- http://www.computerworld.com/s/article/9222484/Mobile_device_management_what_you_should_know
- http://fixmo.com/solutions/mobile-risk-management
- http://www.kaseya.com/features/mobile-device-management.aspx
- http://www.mdsl.com/market-data-management/mdsl-market-data-manager-153-/mdm-benefits
- http://www.information-management.com/specialreports/2007_56/10000385-1.html
- http://www.cio.com/article/710540/7_Reasons_to_Use_AirWatch_for_Mobile_Device_Management
So “Once more unto the breach, dear friends, once more;”
____________________________________________________________
About Rick Ricker
An IT professional with over 21 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.
For more information, contact Rick at (800) 399-6085





No comments:
Post a Comment
Thanks for your input, your ideas, critiques, suggestions are always welcome...
- Wasabi Roll Staff