Mobile Device Management

Inside Track: Mobility mash-up a must for some

Longform
Image: Stockfresh

24 July 2015

Wide view
“An organisation needs to define its policy as the very first step, so that any subsequent decisions on technology, devices supported and levels of control can be guided by the information security needs of the organisation” Noel_O'Grady_sales_director_ward_solutionsWard Solutions: Noel O’Grady, sales director
The biggest challenge in mobility is protecting corporate data on privately owned devices which are remotely accessing potentially sensitive data. The device population may have multiple operating system types, differing levels of vulnerabilities and very different user types.Organisations should take a wide view of their enterprise mobility strategy, one that considers data, devices and applications. What data will be accessible? What devices will we support? What applications will be allowed?

An organisation needs to define its policy as the very first step, so that any subsequent decisions on technology, devices supported and levels of control can be guided by the information security needs of the organisation.

A clear policy can make it easier to find the tools you need to protect and manage both employer-owned and personal devices throughout the organisation.

Once the policy is in place an organisation is probably going to look at integrating mobile device management (MDM). MDM can enforce your policy and reduce the risk of a vulnerable device getting access to sensitive data. Wipe capabilities are also important, so that you can clean up, when things go wrong. Technologies that support containerisation are best so that selective wipe can be achieved where corporate data is cleaned down but personal data and privacy is respected.

At Ward Solutions we help businesses define their mobility strategy, create policies, then design and deploy the appropriate technical solution.

 

 

Knowing the user
“Today’s mobile devices are powerful computers and are an entry point into the business. Knowing who is using the device and what information is stored on the device has become a real issue”

Three Ireland: Nicola Mortimer, head of Business Product, Marketing and Operations

According to International Data Corporation (IDC) the world’s mobile worker population will reach 1.3 billion representing 37.2% of the total workforce by the end of 2015. The mobile phenomenon goes beyond just the device, today it impacts how we engage with people, content and our environment and as a result creates new challenges for business.

Such challenges include:
1. Enabling access for the mobile worker to the right information
2. Security of the device now that it has access to key business information
3. Data protection of sensitive customer and business information

At Three we work with client companies to address each of these challenges by offering tailor made solutions that work for the company and the employee while ensuring effective and speedy communications.

Mobile Applications integrated into a company’s back end IT infrastructure can deliver scalable, manageable solutions for the mobile worker. Information is then available to any user, anytime, anywhere.

Security and integration into the backend IT systems are the top challenges that need to be addressed as part of enabling enterprise mobility. Access controls and policy management will help protect the employee, the customer and the business.

Data protection and data compliance have become real concerns in this new mobile and Internet of Things world. A new Data Commissioner was appointed for Ireland and funding for this office has been doubled by the government in 2015 reflecting the importance and seriousness of data protection. Keeping data safe and secure are fundamental to complying with data protection law.

Today’s mobile devices are powerful computers and are an entry point into the business. Knowing who is using the device and what information is stored on the device has become a real issue.

At Three we recognise the benefits and challenges of this mobile world and we have created a suite of services that will address enterprise mobility end to end. We offer bespoke application development, backend IT integration, mobile device management and policy control. With our experienced Mobility Specialist Team we can develop a mobility plan which focuses on the user experience, the customer experience and the business benefits. We focus on delivering your business needs while maximising the inherent device features and capability. Our approach balances the functionality of the device that we love and the locking down of that device when it comes to business or customer critical information. We help by providing an end to end service from device to delivery to ongoing management.

Our device agnostic approach combined with Mobile Backend as a Service (MBaaS), mobile device management, mobile application management and a robust support model ensure that all organisations large or small can take advantage of the borderless mobile world.

Mobility enabled correctly can increase operational efficiency, drive innovation and help retain key talent.

 

 

Multipronged EMM
“Identity and access management is key. Data access should be assessed on a regular basis to ensure that permissions are based on a least privilege model and that risk data is archived or destroyed as appropriate” Patrick O'Callaghan_Asystec

Asystec: Patrick O’ Callaghan

The primary challenge for enterprises when considering adopting an EMM strategy is how to adequately assess the risk of exposing business processes and data to devices and applications that lack the controls, protections and visibility that traditional enterprise systems afford. While the adoption of consumer based devices for enterprise activities has become wide spread, the reality is that even the most effective MDM, MAM and EMM tools still greatly increase the risk of data loss and the potential for enterprise systems to become compromised.Enterprises today must be granular in their adoption of consumer and mobile devices and they must understand that each business process that is extended to mobile systems stands a much greater chance of negatively affecting the security of that business operation.Asystec would advise a multipronged approach to building an effective EMM strategy. First, identity and access management is key. Data access should be assessed on a regular basis to ensure that permissions are based on a least privilege model and that risk data is archived or destroyed as appropriate. Next, the critical business operations should be mapped to people, technology and process to ensure that effective risk assessments can be performed to identify vulnerabilities at every point in the chain.Finally Mobile Device Management and Mobile Application Management tools should be used to limit the risk of data loss, inter application communication and to ensure that lost/compromised devices can be tracked and wiped in a timely manner. Asystec partners with Varonis, RSA and Symantec to ensure a best of breed EMM strategy. 

 

Read More:


Back to Top ↑

TechCentral.ie