Welcome!

Cloud Security Authors: Elizabeth White, Liz McMillan, Pat Romanski, Zakia Bouachraoui, Yeshim Deniz

Related Topics: @CloudExpo, Mobile IoT, Cloud Security

@CloudExpo: Blog Post

Choosing Your Mobile Device Management Solution | @CloudExpo #Cloud #Compliance

There are many solutions out there, and selecting the right solution for your enterprise may seem challenging

10 Things to Consider As You Choose Your Mobile Device Management Solution
By Nikhil Nayak, Product Analyst, ManageEngine

The past decade has seen an increasing trend in employees using mobile devices like smartphones and tablets to aid in their work. This trend has fostered organizations to adopt practices like bring-your-own-device (BYOD) with hopes of improving employee productivity and efficiency. There is, however, a downside to this because such practices pose major risks concerning corporate data security and data management. In order to ward off these risks, enterprises seek out reliable mobile device management (MDM) solutions.

There are many solutions out there, but selecting the right solution for your enterprise may seem challenging - especially if you're not aware of what to look out for. Here is a list of 10 things to consider as you choose your MDM solution.

1. Understand your business needs and security standards
Every industry is different in its functioning. Defense, health care, IT, retail and others each have their own security requirements. For example, a nation's defense sector will have far more protocols and security clearance requirements when compared with its logistics industry. Therefore, it is essential to be aware of your industry's standards to ensure that there is no ambiguity while performing research on the available features of an MDM solution.

2. Know what's in store while embracing mobility
An enterprise that decides to go mobile should be aware of the associated pros and cons. Let's say that your organization supports BYOD, which allows employees to use their personal mobile devices to perform company-related tasks such as accessing work-related content. Employees would want the ability to complete routine tasks from their smartphones during their downtime so they can focus on mission-critical work while at their desks. This invariably poses a risk in the form of data leakage due to factors such as malware or device theft.

3. Understand app management and security
Managing mobility in organizations involves combating security risks concerning devices and apps. Existing security awareness programs are targeted toward desktop users. If an enterprise is looking to adapt to a mobile environment, these programs have to be revisited to focus on the usage and risks involved with mobile devices. An enterprise should educate its employees to use trusted sources and avoid suspicious third-party sites for app downloads. It should discourage the habit of tapping "Continue" during app installations. An ideal MDM solution has features that prevent suspicious apps from being installed.

4. Segment your organization based on level of trust
Segments in an enterprise can be either hierarchical or departmental. Regardless, certain employees might have access to data that won't be available to others, such as a taxi service provider whose drivers require passengers' pickup and drop-off locations. Their mobile devices can be provisioned to show only this data on an app. However, their superiors can access further details such as passenger email ID and age, which they can use to make data-driven decisions. To maintain tiered protection, top-level employees require stronger encryption and more flexibility.

5. Set policies and restrictions for devices and apps
An ideal MDM solution would let you push policies onto mobile devices. By setting up policies, you can restrict certain device functions. Consider the following situation: Your company has come up with a breakthrough product idea in a market with no other offering that is even remotely similar to yours. Your R&D team is working on materializing this product. To ensure that there is not even the slightest data leak, you need to disable data distribution by preventing local printing or data storage.

6. Identify non-compliant devices
Jailbroken and rooted devices always pose a greater risk because they're an easy target for malware and cyberattacks. You need a system that can quarantine devices so threats cannot spread after detecting malware, app risks, network attacks and other threats. Enterprise data is regularly compromised simply because employees' devices aren't compliant with the enterprise's security policies. An ideal MDM solution should detect whether a device is compliant. It should also let you device lock or remote wipe non-compliant devices and bar them from your organization's network.

7. Create awareness among users
Employees might find an MDM solution to be an invasion of their privacy. While this isn't true, you must take steps to ensure that there are no misconceptions regarding user privacy invasion. An enterprise has to educate its employees on the need for securing mobile devices, while also making them feel comfortable about the MDM setup. This can be done either by developing an end-user license agreement (EULA) or a general acceptance agreement that is shared and signed by the employees.

8. Audit regularly for compliance
Reporting and auditing are common approaches for guaranteeing compliance with regulations and organizational policies. In order to prove compliance, you would have to run regular audits. Along with running regular audits, an ideal MDM solution should be able to push secure apps and enable patching and updates for both devices and apps to ensure that the devices are compliant.

9. Embrace new technology with a bit of caution
There are plenty of device manufacturers out there, each running its own flavor of operating system - be it Android, iOS, Windows, Blackberry, Symbian and others. And the variety doesn't stop there. Every day, enhancements are made to devices to make them faster, increase their storage space and more. To make sure that your employees have what they need to be effective, you would have to survey and study every new device enhancement and app technology. Ideally, the bugs have been worked out before spending your money.

10. Deploy a good MDM solution
In mobile device management, no single solution is one-size-fits-all. An MDM solution is customizable to match an individual organization's requirements. Many industries such as health care, retail and IT can use MDM to their advantage through its ability to cater to their unique needs. Ask your vendor to help you adopt and establish effective day‐to‐day MDM practices.

As first published in IT Briefcase.

###

Nikhil Nayak is a product analyst at ManageEngine, the real-time IT management company and division of Zoho Corporation. For more information on ManageEngine, the real-time IT management company, please visit www.manageengine.com; follow the company blog at http://blogs.manageengine.com, on Facebook at http://www.facebook.com/ManageEngine and on Twitter @ManageEngine.

More Stories By ManageEngine IT Matters

ManageEngine believes IT management can be simple and affordable. Our authors share insights and how-to tips for SMBs and large enterprises. Over 120,000 companies around the world – including three of every five Fortune 500 companies – trust our products to manage their networks, data centers, business applications, and IT services, and security. We take a straightforward, customer-centric approach to IT management software. Our customers' needs drive our product philosophy. And we've built a strong, in-house R&D team to support our product team and turn customer requests into product realities. We look forward to hearing from you.

IoT & Smart Cities Stories
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
DXWorldEXPO LLC announced today that Ed Featherston has been named the "Tech Chair" of "FinTechEXPO - New York Blockchain Event" of CloudEXPO's 10-Year Anniversary Event which will take place on November 12-13, 2018 in New York City. CloudEXPO | DXWorldEXPO New York will present keynotes, general sessions, and more than 20 blockchain sessions by leading FinTech experts.
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.