MDM features vs. native mobile security
|
|
|
- Chrystal Jenkins
- 10 years ago
- Views:
Transcription
1
2 vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce. vs. : Striking a balance By Lisa Phifer Mobile device management (MDM) products can play a big role in mobile security by provisioning and enforcing mobile native security measures embedded in smartphones and tablets. But some MDM products blur the boundary between "governing" and "doing" by delivering integrated security measures such as secure messaging or VPN to replace the native security measures baked into each device. Which approach is a better fit for your workforce? Let's take a look at the pros and cons of each. : Going above and beyond Baked-in can complement native by protecting data at rest, data in motion, or by promoting device integrity. Some MDM-integrated capabilities date back to when mobile operating systems such as Win CE were largely devoid of native security. More recent examples of such integrated measures are the innovations to minimize bringyour-own-device (BYOD) risks. Here are some common examples: Mobile content management: Today, many mobile devices support hardware encryption, but some still do not. In addition, co-mingling of business and personal content makes it harder to reliably wipe sensitive data without negatively affecting the user. To enable safe, productive use, IT should consider pushing business documents over the air to stored in encrypted containers on the device that Page 2 of 6
3 vs. : enable offline access while preventing data leakage. A growing number of MDM products from vendors such as AirWatch LLC and Fiberlink Communications Corp., can provision, update and, (when necessary), wipe this type of "document locker" and its contents to protect data at rest. Integrated secure messaging: Every smartphone includes , contact and calendar apps that synchronize messages, attachments, etc. with carrier or cloud services. Devices commonly support Exchange ActiveSync (EAS)-based enterprise messaging, but supported security policies vary by device make/model. On BYODs, IT should seek to insulate business data where risk warrants by separating business and personal contacts or preventing attachments from being forwarded. To create a consistent deviceindependent environment, some MDM vendors, including Good Technology Inc., Denmark's Excitor A/S and Sybase Inc., incorporate secure messaging apps. These non-native apps can be used to safely access enterprise mail, contacts, calendars and tasks, while IT can easily provision and remove them via MDM. Integrated VPN/firewall: Every mobile OS includes a potpourri of native VPN clients, but the odds of finding your chosen VPN in every device without third-party client installation are slim. Moreover, unlike laptops, smartphones and tablets don't include host firewall capabilities. To eliminate gaps in VPN coverage while deflecting unwanted traffic, some MDM agents (such as those from Mobile Active Defense, Symantec Corp., and Zenprise Inc.) include their own VPN/firewall, protecting all data-in-motion without relying on native VPNs. Antimalware: Contemporary mobile operating systems take steps like application sandboxing to deter malware, but they do not include native virus scanners. Some MDM features (specifically those from McAfee Inc. and Symantec Corp.) fill this gap by building antimalware measures into MDM agents. Jailbreak and blacklisted Page 3 of 6
4 application detection is common; a few agents also provide onaccess or on-demand virus scanners. vs. : vs. native security: A Balancing act Complementary security measures can be beneficial, but do you really need native and MDM-integrated security? When both measures are present, how can you decide which to use to implement enterprise security policies? Let's consider some of the tradeoffs. Platform independence versus separation of duties: MDMintegrated security measures level the playing field, creating a uniformly safe environment on a wide variety of consumer-grade devices. On the other hand, for integrated security measures, the fox is watching the henhouse. If you have a requirement for separation of duties, MDM should not both deliver and enforce security. Trusted environment versus usability: By closing gaps in native security, MDM-integrated containers and messaging apps create a trustworthy environment in which to conduct business. This secure workspace makes it easier to control, monitor and cleanly remove business data and apps. But forcing workers to interact differently with business data and apps can also create confusion and sap productivity. Assess risk by user/group and device to decide which cases warrant this extra security is worth the cost. Simplicity of deployment versus best of breed: MDM-integrated security measures tend to simplify deployment and total cost of ownership. If your workforce requires a third-party VPN/firewall or antimalware, getting these features "for free" with MDM is handy. However, if your MDM's integrated VPN or antimalware approach diverges from those used on laptops or desktops, consistency may dictate use of another vendor's third-party solution. Focus versus extensibility: MDM-integrated messaging applies compensating controls and associated policies to business assets only. IT can operate freely within that space for example, backing Page 4 of 6
5 vs. : up or removing containers as needed because those assets belong to the employer, not the employee. But, unlike native security, this laser-like focus prevents easy extension to other applications. For some workers, a hybrid approach may be preferred for example, secure messaging for robust protection of key business assets, accompanied by native measures such as full device encryption to protect everything else. Ideally, MDM-integrated measures should not force IT s hand -- look for products that empower the enterprise to decide when and where to apply native and/or integrated security measures as appropriate to reflect business risk, device capabilities and security policies. About the Author: Lisa Phifer owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. Lisa has been involved in the design, implementation and evaluation of internetworking, security and management products for 30 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Page 5 of 6
6 vs. : Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 6 of 6
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is
Hybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level
Software Defined Networking Goes Well Beyond the Data Center
Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as
Evaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration
Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and
Securing the SIEM system: Control access, prioritize availability
The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines
HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
Is Your Data Safe in the Cloud?
Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
How To Protect Your Online Backup From Being Hacked
Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be
5 free Exchange add-ons you should consider Eliminating administration pain points on a budget
5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
BRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE
Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics
LTO tape technology continues to evolve with LTO 5
with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies
Managing Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS
E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression
Cloud Security Certification Guide What certification is right for you?
What certification is right for you? This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment
Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Virtualization backup tools: How the field stacks up
tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
E-Guide MOBILE DEVICE MANAGEMENT CHECKLIST
E-Guide MOBILE DEVICE MANAGEMENT CHECKLIST Ensure A well thought-out management strategy is a key ingredient for any successful mobility deployment. This expert E-Guide highlights a management. Additionally,
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier
5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings
Key Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Best practices for mobile data protection
E-Guide Best practices for mobile data protection This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES A ccording to Forrester Research, e-commerce efforts will bring in $280 million in 2015. Companies who want a part of this growing market will
BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS
E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide
Sophos Mobile Control - Competitive Overview
Sophos Mobile Control - Competitive Overview Content Page Introduction to MDM Market overview, positioning and discovery questions 2 Lightweight vs Heavy weight approaches 3 Competitive comparisons AirWatch
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among
ShareFile for enterprises
Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace
Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
