1 The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according to a recent report by Gartner, is likely to continue to rise by epic proportions. The report called the trend an unstoppable train coming down the tracks, and estimates that 40 percent of organizations already support employee-owned mobile devices. While this trend is an incredible boon for employee satisfaction as well as enterprise productivity and IT-cost savings when it comes to hardware, service and support, it also presents its own share of challenges when it comes to security. Yet this should not deter the enterprise from continuing to embrace the BYOD trend third-party solutions from companies that have long supported the integration of diverse enterprise operating environments are emerging that allow enterprise IT departments the control and peace of mind they require to ensure that BYOD does not open the door to corporate security breaches. These solutions fall under the categories of mobile device management (MDM) and mobile file management (MFM). BYOD is not the only reason to consider MDM and MFM, however. In many cases, mobile devices are provisioned by the enterprise itself. Or, some enterprises are provisioning mobile devices for specific departments and uses such as a field service or field sales deployment with an application standardized on a rugged handheld, smartphone or tablet. Such uses still require MDM and MFM to ensure the enterprise s assets and critical files are protected. In this white paper we ll discuss the how, why, and what solutions are currently available to secure and manage corporate assets like files, apps and devices in the field. We ll cover: Mobile Device Management Solutions, Mobile File Management Solutions, and Running Mobile Device Management and Mobile File Management in tandem. We ll also highlight the steps required of enterprise IT to ensure all your corporate assets are protected on your employee s mobile devices, so that both the BYOD trend and proprietary provisioning of mobile devices brings increased productivity and prosperity, not havoc, to the enterprise.
2 Mobile Device Management Securely and Easily Provision, Deploy and Manage Devices and Apps Mobile device management, or MDM, enables enterprises to centrally manage and ensure the security of mobile devices used by employees. According to Gartner s April 2011 report Magic Quadrant for Mobile Device Management Software, Enterprise MDM products and services help enterprises manage the transition to a more complex, mobile computing and communications environment by supporting security, service, software and inventory management across multiple operating-system platforms, primarily for handheld devices such as smartphones and tablets. 2 MDM applies to both enterprise-provisioned devices, as well as employee-owned devices that are brought into the enterprise. MDM software comes complete with either cloud-based or server-based management software as well as on-device software footprints that provide secure connectivity between every device in the field and the corporate network, ensuring that IT has a complete view of every device and can manage and provision devices securely and easily. MDM and MFM: separate but equally important for enterprise security MDM gives enterprises a secure and simplified way to manage both the usability and the integrity of the myriad and multiple mobile devices used by their employees. This presents a huge value to enterprises by supporting employee productivity and freedom of choice, and further, prevents future loss of assets via unsecured, unmanaged devices. By replacing piecemeal solutions that require multiple points of oversight with one, centrally-administered solution, the cost savings is further multiplied.
3 Complete MDM solutions should give IT the ability to: Configure employee devices, such as mobile phones, tablets and even laptops according to the company s own standards; Provision clients like Exchange or Lotus, Wi-Fi and server access; and Lock or wipe a device remotely if it is suspected of being compromised. Mobile Device Management: Made for the Enterprise The components that make up a fully-managed MDM solution, including software distribution, policy management, inventory management, security management and service management, are not new. However, their grouping together to specifically address the needs of the mobile workforce is a fairly new development. Traditionally, device management fell under the responsibility of enterprise IT departments and only included software and services as related to PCs and other hardware, while smart phones are managed by the messaging group. MDM administration can fall under either category, however, as the number of mobile devices, and the variety of mobile operating systems represented therein, expands. Solutions like those available from Good Technology made their debuts over a decade ago. However, as more companies allow for a variety of devices, including ipad, Android and others, to participate in the company network, third-party MDM solutions have evolved and more players like MobileIron and others have made a large impact on the market. Whether running on ios, Windows, Android or Blackberry, today s MDM solutions allow for central management of all devices on the network. Currently, most MDM solutions are offered as on-premise or software-as-a-service (SaaS)-based tools. Benefits of Mobile Device Management MDM basically acts as a company-owned and managed security detail that travels with the employee s device, checking in with the corporate server to access and other network-controlled applications and software. MDM often includes features such as enforced password protection, audit trail and logging, remote lock and device wipe capabilities that can be issued from the corporate server to the device. Most mobile devices, such as ipad, come ready to be provisioned via MDM. 3 Limitations of Mobile Device Management While MDM allows for corporate provisioning of devices (even if they are purchased by the employee) and secures the device for and in the event of loss or theft, it does not provide secure access to corporate files.
4 If employees are using their smart phones or tablets to access critical data such as confidential files from the corporate server MDM may not go far enough in securing enterprise assets. MDM only protects the device itself and provides a great way to provision applications and updates to those applications. It also allows applications to run in their containers, securing business applications like field service, , field sales and more. However, to further secure the data stored and accessed on the device, or to prevent unauthorized access of data and files from corporate servers via an employee s tablet or mobile phone, MFM is required. Companies that want to deploy a large number of devices and applications and centrally-manage them will use MDM, as all devices are enrolled in this service and tracked on the server. Mobile File Management Securely and Easily Access, Edit, Store and Save Enterprise Server Files on a Mobile Device Mobile file management, or MFM, allows businesses to manage the transfer and storage of corporate files to an employee s mobile device. It allows corporate IT to provision access to these files and whether the files can only be viewed, or also stored and saved, to the employee s device. With mobile devices such as ipad, iphone or Android devices, MFM overcomes the device s inherent lack of on-device storage by allowing corporate files to be accessed and stored within the MFM software on the device, while still giving the enterprise ultimate control over those files. While MDM can dictate that a device itself cannot be used without entering a passcode, MFM can be configured to dictate that the software used to access, edit, or store corporate files cannot be opened (and hence, the files) without entering a passcode. Also, if the device is lost or stolen, MDM can only lock or wipe the entire device. MFM takes this a step further by locking access to the corporate server as well as corporate files stored on the device by allowing for remote wipe of the MFM container by enterprise IT. 4 Like MDM, MFM is installed on the corporate server and the device. Mobile File Management: Made for the Enterprise and the SMB Enterprise-level MFM is ideal for any company that wants to grant employees access to the corporate server and files without having them resort to unsecure, consumer solutions that allow for file transfer without corporate oversight, and that do not enable those same files to be simultaneously be edited on the server and the device. Such MFM solutions are also beneficial to any company looking to ensure employees can access files on the corporate server via mobile phones and ipads, which do not have native file storage, without worrying about the security risks for un-provisioned access via or consumer applications. With mobile devices such as ipad, iphone, or Android phones, MFM overcomes the device s inherent lack of on-device storage...
5 Benefits of Mobile File Management Whether deployed in conjunction with MDM or used alone, MFM streamlines workflow, leading to increased productivity and satisfaction from employees, and eases security concerns for corporate IT departments at the same time. It s a no-brainer for any company looking to make the most of the speeding BYOD train, as well as companies that have purchased tablets or other mobile devices for their employees. For added security and peace of mind for both corporate files AND corporate devices, there s nothing like MFM and MDM working together. How Mobile Device Management and Mobile File Management work together for maximum security Mobile Device Management Alone is Not Enough MFM does not require MDM. And while MDM alone leaves file access unsecure, MFM and MDM combined offer a previously unseen level of comprehensive security. Although MDM allows for access and security in devices and provisions, it lacks secure file access and on-device storage (MFM), which is an even more critical component to security. Together, MFM and MDM allow both device and files to be safely monitored and managed by corporate IT. While centralized MDM can manage device, and other applications, not all MDM providers allow for the provisioning of MFM applications. When considering an MDM vendor, it s important to choose one that includes MFM in the application container. In short, MDM protects the device; MFM protects the files, creating a complete security solution. So while MDM can wipe a device if it s stolen in the time between when it goes missing and when it is reported missing to the IT department, MFM ensures critical files and corporate assets cannot be accessed in the meantime. If all you need is to enable employees to securely access files, and protecting the device and corporate is less of a concern, then MFM by itself is fine. MFM running outside a container provides the same security as if it were running inside the container. The benefit of buying a packaged MFM/MDM solution would be the additional benefit of centrally managing all applications, including MFM, in one container. Mobile Device Management & Mobile File Management Together: Made for the Mobile Enterprise and Savvy SMB Currently, most MDM vendors do not have an application that can control files. And the few that do have low feature/function sets with little thought to scalability. So if a company is seeking the complete security that MDM and MFM offer together, they will also need to seek out an MFM solution. Industry-leading MDM vendors like MobileIron 5 and Good Technology 6 are working to offer MFM within their MDM containers. Look for MDM solutions that integrate with MFM that s key. Most enterprise-level MFM solutions will work with any, if not all MDM providers. Additionally, just as MDM can be deployed on multiple devices and operating systems within one company, enterprise-level MFM solutions now exist that are deviceagnostic, and support Apple, Windows, and Android or Blackberry platforms.
6 Benefits of Combining Mobile Device Management with Mobile File Management Specific benefits of the MDM and MFM partnership within an enterprise include encryption: if the MDM used by an enterprise is configured to allow device use only after a lock-code is entered, the MFM solution partner then allows for file access to also be encrypted. Not only can MFM be enabled to remotely wipe confidential files from a device, it can even wipe the device of the file management software. In the age of BYOD, this feature is extremely beneficial as it allows companies to remove access to corporate files from a rogue, or former, employee s device without shutting the device down completely (as MDM might do). Hence, the device remains the property of the former employee, but corporate assets are still controlled by the enterprise. The enterprise mobility strategy is incomplete without Mobile file management MFM does not require MDM but is needed for maximum mobile security throughout the whole of the enterprise. For enterprises just wanting secure file access, MFM is a perfectly acceptable solution that leads to maximum security. To get the most out of your MDM provider, and to ensure uncompromised security for device AND file access, you should also have an MFM solution that complements MDM. For enterprise purposes, MDM and MFM are an ideal marriage to ensure maximum security. Enterpriselevel MFM solutions are the most complementary to enterprise-level MDM. Consumer applications don t come close to allowing the meticulous configurations and provisioning required by corporate IT departments. Many of the consumer apps aren t even enterprise-ready. MDM and MFM solutions uniquely suit cross-platform enterprise environments where Windows is not the only operating system in use. The mobile enterprise train has left the station, and it s picking up speed. Are you ready with an appropriate MDM and MFM solution in mind when it comes rolling through your company? 1. train_in_the_enterprise/ rc=website<yp=online%20content&mcid= dpz&mlsrc=website&mltyp=online%20 Content
7 About Acronis Acronis is leading the next wave of data availability, accessibility and protection solutions to simplify today s complex IT environments. Acronis technology enables organizations of all sizes to manage the always-on anywhere data access demands of users, reducing risk against the loss of valuable corporate data, and controlling management and storage costs. With proven technology for data migration and disaster recovery for physical, virtual and cloud environments, and secure enterprise filesharing and synchronization regardless of type or platform, Acronis is enabling organizations to embrace new IT strategies and options such as BYOD and Mac in the enterprise. For additional information, please visit Follow Acronis on Twitter: For additional information please visit To purchase Acronis products, visit or search online for an authorized reseller. Acronis office details can be found at Copyright Acronis International GmbH. All rights reserved. Acronis, mobilecho and the Acronis logo are trademarks of Acronis International GmbH. ExtremeZ-IP is a registered trademark of GroupLogic, Inc. Windows is a registered trademark of Microsoft Corporation. Other mentioned names may be trademarks or registered trademarks of their respective owners and should be regarded as such. Technical changes and differences from the illustrations are reserved; errors are excepted
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your
Comprehensive Guide to Moving a File Server to Google Drive Brought to you by Google Gooru *To get notified of new updates to this Guide: Add us to your Circles on Google+ **For in-depth training on everything
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
Five Hosted VoIP Features WHITEPAPER: hosted exchange BUYER S GUIDE www.megapath.com executive summary The adoption of cloud-based hosted services is gaining momentum among businesses interested in reducing
Best Practices for Cloud-Based Information Governance Autonomy White Paper Index Introduction 1 Evaluating Cloud Deployment 1 Public versus Private Clouds 2 Better Management of Resources 2 Overall Cloud
The workplace landscape is changing rapidly as people walk into the office with the expectations and sometimes the tools they carry from home. The requirements for flexibility rise even higher as employees
SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses
MOBILE FIRST ENTERPRISE 1 White Paper Mobile-first Enterprise: Easing the IT Burden 10 Requirements for Optimizing Your Network for Mobility 2 MOBILE FIRST ENTERPRISE Table of Contents Executive Summary
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
What ios 7 Means for the Enterprise Introduction 3 1. ios 7 Mobile Application Management Enhancements 4 Enhancements to Accelerate Enterprise Application Development and Use 5 Enterprise Application Single
OpenScape Enterprise Discover how to unleash the potential of your virtual teams To achieve business advantage, enterprises are finding new ways of tapping the collective skills, knowledge, expertise and
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
The Definitive Guide To tm Building Highly Scalable Enterprise File Serving Solutions Chris Wolf Chapter 5: Building High-Performance, Scalable, and Resilient Linux File-Serving Solutions...87 Challenges
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
Microsoft System Center 2012 R2 Why Microsoft? For Virtualizing & Managing SharePoint July 2014 v1.0 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance