Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD



Similar documents
Guideline on Safe BYOD Management

Kaspersky Security for Mobile

A Guide to MAM and Planning for BYOD Security in the Enterprise

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

How To Secure Your Mobile Devices

Bring Your Own Device and Expense Management

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Cloud Backup and Recovery for Endpoint Devices

Tuesday, June 5, 12. Mobile Device Usage

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Managing Mobility in the BYOD Era:

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Chris Boykin VP of Professional Services

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

Mobile Devices in Healthcare: Managing Risk. June 2012

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

CA Enterprise Mobility Management MSO

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

IBM Endpoint Manager for Mobile Devices

How To Protect Your Mobile Devices From Security Threats

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Codeproof Mobile Security & SaaS MDM Platform

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

"Secure insight, anytime, anywhere."

Mobile Device Security

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Device Management for CFAES

Mobile Security: Controlling Growing Threats with Mobile Device Management

Ensuring the security of your mobile business intelligence

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Securing Health Data in a BYOD World

Security and Privacy Considerations for BYOD

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Feature List for Kaspersky Security for Mobile

Secure Your Mobile Workplace

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Bring Your Own Device (BYOD) and Mobile Device Management.

Dell Bring Your Own Device

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Stress-free mobility A mobile framework for the extended enterprise. April 29, 2015

A Guide to Consumerization & Building a BYOD Policy June 2012

Mobile Madness or BYOD Security?

Use of Mobile Apps in the Workplace:

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

Mobile Device Strategy

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

IT Resource Management vs. User Empowerment

A CIO s Guide To Mobility Management

Best Practices Guide to Electronic Banking

Five Best Practices for Secure Enterprise Content Mobility

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

Use Bring-Your-Own-Device Programs Securely

Mobile Security: The good, the bad, the way forward

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Mobile Security & BYOD Policy

HELPFUL TIPS: MOBILE DEVICE SECURITY

Security and Compliance challenges in Mobile environment

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Symantec Mobile Management Suite

Mobile Security Standard

Hands on, field experiences with BYOD. BYOD Seminar

ONE Mail Direct for Mobile Devices

Insert Partner logo here. Financial Mobility Balancing Security and Success

AirWatch for Android Devices

How To Manage A Mobile Device Management (Mdm) Solution

Small businesses: What you need to know about cyber security

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

trends and audit considerations

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Data Protection Act Bring your own device (BYOD)

Putting Operators at the Centre of

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

Choosing an MDM Platform

Mobile First Government

A guide to enterprise mobile device management.

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ForeScout MDM Enterprise

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Bring Your Own Device (BYOD) and Mobile Device Management

The Truth About Enterprise Mobile Security Products

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

CHECK POINT THE MYTHS OF MOBILE SECURITY

Sophos Mobile Control User guide for Apple ios. Product version: 4

BENEFITS OF MOBILE DEVICE MANAGEMENT

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

CHOOSING AN MDM PLATFORM

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform

Get Tough with Mobile Device Management

Use of tablet devices in NHS environments: Good Practice Guideline

BOYD- Empowering Users, Not Weakening Security

Transcription:

STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD Blues A conversation like this one between an organization s IT help desk and a mobile worker may be heard after each time a cool, new smartphone hits the market and becomes a bring your own device (BYOD) mixed blessing for the organization: What do I need to do to use my new smartphone for work? We can set it up so that only you can use it by entering an ID and an 8-10 digit password. If it is lost or stolen or if you switch organizations, we will remotely lock it or wipe it clean. I m not sure I like the idea of my device and personal stuff being wiped clean. We can create separate personal and work spaces on your device so only work stuff would be wiped. Sounds great. Thanks. A few hours later, the conversation continues: Something is wrong with my new smartphone. When I tried using it during a client meeting, I couldn t process an order. Did you forget your password? No. I couldn t find my work applications. Did you wipe my phone for some reason?

No. The only apps on your phone that can access our corporate systems are the email and web browser apps. For some business productivity apps, go to your phone s public app store. So that s where all of my regular work apps are waiting for me? Not exactly. Public app stores have business apps like web and audio conferencing. Be careful or you may end up downloading the wrong apps that won t work right or that could infect your smartphone with viruses. Uh, ok. What about the rest of my regular work apps? We actually don t have a quick or easy way to load all of the corporate mobile apps onto your smartphone. If you list all of your work applications, we will look into what mobile apps are available and then sideload each one onto your phone. I use many work applications and was hoping to be using all of them on my smartphone right away. I ll send you the list as soon as possible. This conversation illustrates the roller coaster ride on which mobile workers can find themselves regarding BYOD smartphones and tablets. Eager to start using their new devices as mobile work platforms, workers either turn to IT for help or to third party resources through self-help in the hope of making their devices fully functional in work environments. What workers quickly discover is that their organizations are often not yet equipped to prep new mobile devices in the same way that new laptops are prepped with an image containing all relevant work software and settings. While third party websites may provide helpful information and downloads, they may also pose malware threats. IT often still treats smartphones less like PCs and more like telephones for voice, text and email communications despite the fact that the computing capabilities gap between these mobile devices has shrunk. The limited corporate resources and attention paid to prepping mobile devices for work purposes underestimate the powerful potential for running mobile work apps that keep mobile workers connected to the corporate applications and information that they need. This also frustrates workers who want to exploit the form factor, availability, and convenience of mobile devices. Not that smartphones and tablets are being ignored by corporate IT. In fact, organizations around the world are recognizing both the business value and risks of smartphones and tablets. The growing popularity of BYOD programs is being driven by the resulting higher productivity and morale for workers as well as saving costs and boosting reputations for organizations. With more than one hundred million smartphones being purchased by individuals for work use globally in 2012 (Source: Strategy Analytics Mobile Workforce Strategies report, Global Business Smartphone User & Sales Forecasts, 2010-2016 by Employee Segment, January 2012), organizations are taking steps to balance the benefits of workers choosing and paying for their own mobile devices with the risks of hundreds of different mobile devices

designed mainly with consumers in mind being used to access corporate systems and data across various wireless networks. In terms of corporate investment priorities, mobile devices and security solutions continue to see spending increases (see Figure 1). Figure 1. Please indicate whether IT spending at your organization will increase, decrease or stay the same this year compared to last year Source: Strategy Analytics 2012 Global Enterprise Survey of 1750 SMBs and large enterprises Mobile Device Management Protects Against Unauthorized Device Use Mobile device management (MDM) software and services provide an important layer of management and security protection. Six out of ten organizations use MDM to protect devices from unauthorized users (Source: Strategy Analytics 2012 Global Enterprise Survey). Here are the basic elements of MDM that organizations should expect: Enforce password protection to a sufficient degree of password complexity based on length and character types Lock the device if it is lost or stolen to prevent further access Wipe the data off the device if it is lost or stolen with prior consent/agreement from the user Encrypt the data located in memory on the device Restrict applications from being loaded and run on the device that could infect it with malware Restrict Internet or specific domain access that could infect it with malware or expose work data to a high risk of theft

Other management capabilities do exist that focus on mobile devices. For example, mobile device analytics track battery life, network connectivity, and performance to identify current or potential issues that could be addressed. This capability could evolve into a standard element of MDM over time. MDM s focus on the mobile devices themselves means that the management and security protection that it provides is limited to the individual devices and their life spans. When device owners add second or third mobile devices or replace their devices as they tend to do every 1 to 1.5 years, IT needs to register each new device with the MDM system. Mobile Application Management Adds Protection and Addresses BYOD In addition to enhancing security, mobility management is evolving to address the application needs of mobile users. Mobile application management (MAM) focuses on the application layer, including confidential corporate and customer information and an organization s core IP. When mobile apps are needed to access corporate data in the interests of worker productivity, MAM addresses the needs of workers and their organizations for application protection and provisioning which complement the device protection of MDM. Here are the basic elements of MAM that organizations should expect: Enforce application level security for all business apps including user authentication and data encryption Permit (whitelist) or block (blacklist) application loading based on the mobile user s department, role and other considerations Provide one place, an enterprise app store, for storing all mobile apps from internal and external developers that can be tested and certified as safe and functioning properly Distribute mobile apps in an automatic and managed manner to mobile devices based on policies that consider user roles and departments to ensure that mobile workers have the right set of work apps, with apps not even appearing to non-authorized users Update mobile apps automatically so that mobile workers always have the latest versions reflecting software patches and new features Track mobile app downloads and usage for licensing and compliance reporting and planning purposes

As MAM evolves, look for additional application management features that go beyond these base elements. For example, geofencing can limit access to specific apps or data based on the user s device GPS location at a particular time to minimize the risk of data loss due to higher risk networks such as unsecured public WiFi or work locations such as events attended by competitors who may see the information. Another example is containerization or sandboxing of work apps and data in separate workspaces from personal stuff on the same mobile devices which was mentioned in the mobile worker/it help desk conversation above. This capability sits between MDM and MAM in that it balances the interests of device owners to use both personal and work apps and content and that of organizations to wipe only work related apps and data when necessary. In the conversation, we also heard about the challenges and delays that mobile users can face when trying to get mobile work apps onto their smartphones and tablets. This happens when organizations focus only on protecting against the risks that mobile devices pose. In contrast, the use of MAM provides the ability to focus on addressing the needs of workers and their organizations using BYOD and corporate devices to be productive quickly and easily with a full set of mobile work apps. Enterprise App Stores Eight out of ten organizations send workers to public app stores for commercial business mobile apps. Three out of ten organizations use enterprise app stores or automated push to distribute work apps to mobile devices (Source: Strategy Analytics 2012 Global Enterprise Survey). The practice of sending workers to search for work apps on consumer-oriented public app stores like Google Play and the Apple App Store is not ideal. It is a poor use of mobile worker time and can result in frustration, as well as malware threats. For custom and other mobile apps that aren t readily available on public app stores, three out of ten organizations use manual processes to load apps onto mobile devices. Organizations looking for a better solution are discovering the value of MAM and enterprise app stores (see Figure 2).

Figure 2. How do you manage the distribution of mobile applications at your organization? (multiple responses accepted) Source: Strategy Analytics 2012 Global Enterprise Survey of 1750 SMBs and large enterprises The use of MAM benefits mobile workers and their organizations in several ways: 1. Mobile workers get the right work apps quickly and easily on their devices without having to spend time and endure exposure to the risks and distractions in searching public app stores. The mobile device user simply subscribes to the enterprise app store to automatically download all relevant mobile apps and subsequent updates. This saves time and protects against downloading malware that could lead to personal and corporate data loss or theft. 2. Corporate IT gains secure and efficient processes for storing, licensing, distributing, tracking, and updating mobile work apps at their organization. Instead of responding to requests for mobile device setups with frustrating conversations like the mobile worker/it help desk one above, IT can quickly and automatically process all mobile devices for both internal and third party apps with same levels of reliability, efficiency, and consistency that have become the norm for laptop setups. Because MAM operates at the application and data level, policies and processes that are set up for mobile workers can be reapplied, as appropriate, to all of the worker s mobile devices now and in the future.

Conclusions Organizations are recognizing that mobile devices and applications can be extremely useful tools for an increasingly mobile workforce. Supporting workers with BYOD and corporate smartphones and tablets provides clear benefits to everyone but it does require a balancing of mobile worker and corporate interests. Organizations need to provide simple and easy access to the devices and apps that mobile workers feel they need to be productive without posing risks to corporate interests. The combination of MDM plus MAM solutions that evolve over time equips organizations with effective enterprise mobility management tools and processes to both protect and address the use of mobile devices and apps by mobile workers to be more productive and satisfied employees. Sponsored by AT&T Mobile Enterprise Management from AT&T integrates device and network-based security controls with encrypted transport to provide mobile security, complemented by application and device management solutions in a variety of configurations. Through a comprehensive suite of development tools, AT&T enables organizations to build custom mobile applications for business-to-business, to-enterprise, toconsumer, and government to citizen. In addition, AT&T gives businesses the ability to manage protected workspaces within employees mobile devices, allowing employees the flexibility they desire and providing a high level of confidence to the enterprise. AT&T has the experience and resources necessary to be your complete mobility solution provider. For more information, visit us at www.att.com/mobilemanagement