How To Manage A Mobile Device In An Enterprise



Similar documents
An Mformation Whitepaper ENTERPRISE MOBILITY SOLUTIONS FROM THE CLOUD REMOVE THE BARRIERS 1

BRING YOUR OWN DEVICE

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

An Mformation Whitepaper SERVICE ENABLEMENT USING MDM TO ENABLE HIGH-VALUE DATA SERVICES

When is Cloud-managed WLAN a Good Fit?

SANS Mobility/BYOD Security Survey

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

IT Resource Management & Mobile Data Protection vs. User Empowerment

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

EMPOWERING THE DYNAMIC WORKPLACE

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Choosing an MDM Platform

A number of factors contribute to the diminished regard for security:

CHOOSING AN MDM PLATFORM

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Kony Mobile Application Management (MAM)

CDW PARTNER REVIEW GUIDE SOFTWARE LICENSE MANAGEMENT

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

BYOD (Bring Your Own Device)

Enterprise Mobility Management 101

Simplifying the Challenges of Mobile Device Security

Windows Phone 8.1 in the Enterprise

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

How To Manage A Mobile Device Management (Mdm) Solution

Telecom Expense Management

What We Do: Simplify Enterprise Mobility

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Bell Mobile Device Management (MDM)

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Develop A Mobile App For Business

When Computers really become Personal

The flexible workplace: Unlocking value in the bring your own device era

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

6 Things To Think About Before Implementing BYOD

W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n

Addressing BYOD Challenges with ForeScout and Motorola Solutions

ios Enterprise Deployment Overview

Securing BYOD With Network Access Control, a Case Study

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

The State of Mobility in the Enterprise in 2014: An IDC Survey of Devices, Platforms, Decisions, and Deployments

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Key Strategies To Capture And Measure The Value Of Consumerization Of IT

Deep Dive BYOD, COPE & MDM

Enterprise Mobility Best Practices 2017 Analysts Predictions

Mobile and BYOD Strategy

Five Steps to Android Readiness

Guideline on Safe BYOD Management

How To Protect Your Mobile Devices From Security Threats

Smart Givaudan. From BYOD experience to new mobile opportunities

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

Mobility Solutions for Plant Personnel

The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle

Android for Work powered by SOTI

An Agile and Scalable Mobile Workplace

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

BYOD: Focus on User Experience, Not the Device

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments

Transcription:

An Mformation Whitepaper MOBILITY MANAGEMENT: MANAGING THE BRING-YOUR- OWN-DEVICE (BYOD) PHENOMENON 1

Mobility Management: Managing the Bring-your-own-device (BYOD) Phenomenon In many organizations, the traditional enterprise where hardware and software assets are owned, distributed and managed for and by enterprise IT is changing. The emergence of bring-your-own-device (BYOD) programs in the enterprise is one trend that is changing the old IT control-oriented paradigm. Although the BYOD model creates new issues for IT, it also creates a range of organizational benefits, from increased productivity to increased flexibility, which top-performing employees have begun to expect. Work is no longer seen as a 9-to-5 job, and those individuals who set out to build fulfilling careers need the support to work anytime, anywhere efficiently and conveniently. This is the kind of employee that top organizations want to attract and retain, making BYOD a trend that enterprises need to embrace with both arms. The Consumerization of IT With the advent of smartphones and other mobile devices, strong user preferences and widespread application availability, the trend to bring your own device (BYOD) to work is fast taking hold in the enterprise. It is no longer the IT department that solely dictates what devices employees will be given to do their work, but rather it is the employees who are increasingly asking (and sometimes dictating) what mobile devices, applications and services IT needs to support The fact is that employees are consumers too. They have developed mobile device preferences, and want to use the devices with which they are most comfortable, both inside and outside their employer s environment. They use their mobile devices regularly for personal activity as well as business activity, which is driving an increased merging and overlap between these two spheres of life. As Internet connectivity and mobility become more 1

integral parts of all aspects of daily life, employees are seeking more mobile, flexible solutions from their employers. In the past, enterprise mobility was generally limited to providing executives and key staff with mobile access to corporate email on company-issued BlackBerry devices. In stark contrast, many mobile employees purchase email-capable smartphones or other mobile devices, set them to access their own personal email and data sources, and then bring the devices into work, expecting, at a minimum, to be able to configure them to connect to their office Wi-Fi network and access their company email servers. Consumers today are the number 1 users of semiconductors; they passed over IT and government in 2004. - Paul Otellini, CEO, Intel There are currently three different approaches being taken by enterprises with respect to devices and the overall liability for the devices and device activity: Individual-Liable: With this approach, the individual employee is responsible for procuring the mobile device they own it, the contract is in their name, and they are responsible for paying the recurring charges. Corporate-Liable: With this approach, the enterprise procures the device, arranges for the service plan, and is responsible for paying the recurring charges. Corporate-Sponsored/Individual-Liable: With this approach, the enterprise sets up a standard list of authorized devices from which the employee can choose. The individual chooses a device from the list, procures the device, and then expenses the cost of the device, together with the recurring charges up to a pre-defined limit. These liability models then need to be spliced in with the enterprise s overarching mobility management style. A company needs to determine its overarching view of mobility and then, within this structure, determine the best approach to take with regard to device liability. The simple command-and-control days for the enterprise are largely gone. At one end of the spectrum, a few companies will still be able to set and determine the devices, applications and mobile services that will be used by their employees. For these companies, corporate-liable will be the sole device liability model that is relevant in the organization. At the other end of the spectrum, a few companies will have a laissez faire approach to the mobile devices, applications and mobile services that will be used within the company. In these organizations, an individual-liable approach will be the relevant device liability model. Most organizations will sit somewhere in between these two poles. Even with a laissez faire approach, although the organization is not determining which devices will be 2

used by their employees, there will still be an underlying IT role regarding the security and other core polices that IT needs to determine and apply. BYOD Some Management Considerations As enterprises consider their mobility management models and mix of device liability types, there are some underlying management activities that should be considered. In this section we discuss the specific management issues and challenges brought out when enterprises adopt bring-your-own-device policies: Device Inventory: In any context, IT needs to know the devices and employees accessing the company network this is the baseline. However, as more and more devices come into the enterprise with individual employees, IT often has less and less of a clear idea about what devices are accessing what resources within the company. For example, if IT enables individual-liable devices to connect to the corporate network using Exchange and ActiveSync, then there is no way of taking an inventory of how many devices are on the network. Mobile device management (MDM) capabilities that provide a range of inventory capabilities can alleviate this issue, giving IT a clear picture of exactly what devices and employees are accessing company resources. Security: Security in general and security for mobility remain core responsibilities for IT regardless of the mobility management model being used or the approach being taken to device liability. The proliferation of individual-liable smartphones and tablets puts additional challenges in front of IT. IT departments need remote diagnosis, troubleshooting and updating capabilities for individual-liable devices that can help them keep the corporate network and data secure. The sheer number of different device makes, models, OS platforms, firmware versions and software coming into the company on individual-liable devices is the biggest issue. A mobile device management solution that supports a broad range of devices and that has processes for supporting new devices as they come to market is a necessity for keeping the enterprise and enterprise data secure. Heterogeneous vs homogeneous device populations: As the population of individual-liable devices grows within an enterprise, there will be a broader range of different types of devices to manage. Because the choice is completely in the hands of the individual and the choices are many and varied, the population of individual-liable devices in a particular enterprise will be, by definition, heterogeneous. Management of a heterogeneous group of mobile devices is far more complex than management of the more homogeneous that tends to result from control-oriented mobile management 3

models and corporate-liable devices. With a more heterogeneous device population, a mobile device management solution that supports a broad range of devices and has processes to support new devices as they come to market is a necessity. Known vs unknown device capabilities: Individual-liable devices tend to be unknown to the enterprise, and managing them can become a very complex process. Beyond basic inventory information, an understanding of the capabilities of the different devices is needed so that the IT department understands the capabilities and limitations of the devices employees are bringing in. Expanding on basic device inventory functionality, once the device type information has been obtained, a mobile device management solution should be able to populate all of the necessary device capability information automatically and then manage the devices against their capabilities. Lifecycle management: Controlling the lifecycle and activity of corporate-liable devices is a central activity for IT, which can plan and budget for the hardware purchases/activation and for device end-of-life. Lifecycle management of individualliable and corporate-sponsored/individual-liable devices, on the other hand, varies in many respects to the management of corporate-liable devices. Both activation and end-of-life of individual-liable devices occur at different points for the corporation with less pre-warning, visibility or corporate control. The initial connection of a new device to the enterprise network is a key trigger event for IT. A mobile device management solution that can see into the device, recognize it and determine access policies is critical at this point. It is also important that when a user leaves a company, IT can clear away any enterprise policies, applications or data on an individual-liable, without affecting the individual s personal data on that same device. The Bottom Line When allowed to use their own devices, employees enjoy increased flexibility, higher job satisfaction, and improvements in efficiency and productivity. This, in turn benefits the enterprise; according to a worldwide survey of 1,100 mobile workers by enterprise mobility vendor ipass, employees who use mobile devices for both work and personal issues put in 240 more hours per year than those who do not. Managing this new environment will bring new challenges. There will be different mixes of mobility management models and device liability approaches with a few organizations maintaining strict control over all of the devices used within the enterprise at one end of the spectrum, a few organizations adopting an exclusively individual-liable approach at the other end, and the majority of organizations falling somewhere in between. IT must respond to the 4

challenge of different mobile management models combined with a mix of individual-liable, corporate-liable and corporate-sponsored/individual-liable approaches. From an enterprise standpoint, the innovative BYOD business model and its attractiveness to employees provide a number of advantages. BYOD policies can help to attract and retain top performers, who seek to work flexibly and often put in time outside of traditional work hours. An enterprise can use a BYOD policy as a differentiator in their hiring efforts; not only can it be seen as an advantage to tech-savvy potential employees, it also shows that the enterprise is on the cutting edge of new practices and technology. In addition, employee on-boarding and training time is reduced with a BYOD approach, and employees are more efficient and productive all benefits that can directly impact the bottom line. However enterprise IT still needs to retain ultimate responsibility for security of corporate information and activity on the corporate network. An enterprise mobility management (EMM) solution is a critical tool for enabling IT to support these much more complex organizational approaches and device liability models. 5

CONTACT US If you would like to receive additional information on our company and our innovative mobility management solutions, please feel free to contact us. Mformation Software Technologies, LLC 581 Main Street, Suite 640 Woodbridge, NJ 07095 Tel: +1 732 692 6200 Fax: +1 732 549 7542 www.mformation.com info@mformation.com Mformation Software Technologies LLC. All rights reserved 6