Enterprise Mobility Management 101



Similar documents
DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

A CIO s Guide To Mobility Management

Securing Enterprise Mobility for Greater Competitive Advantage

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

When Computers really become Personal

EasiShare Whitepaper - Empowering Your Mobile Workforce

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE

MDM and beyond: Rethinking mobile security in a BYOD world

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Managing Mobility in the BYOD Era:

Mobile Madness or BYOD Security?

AirWatch Solution Overview

Cloud Backup and Recovery for Endpoint Devices

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

A number of factors contribute to the diminished regard for security:

The Maximum Security Marriage:

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BEST PRACTICES IN BYOD

What We Do: Simplify Enterprise Mobility

A Mobile Architecture, Not Just a Mobile App

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Taking Your Enterprise Mobile: The Executive Checklist

Enterprise mobility trends 2015 and beyond

Android for Work powered by SOTI

Addressing BYOD Challenges with ForeScout and Motorola Solutions

How To Manage A Mobile Device Management (Mdm) Solution

CA Enterprise Mobility Management MSO

Mobility in Claims Management

How To Write A Mobile Device Policy

IT Enterprise Services

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Five Best Practices for Secure Enterprise Content Mobility

How To Support Bring Your Own Device (Byod)

Mobile Device Management

Technical Note. ForeScout MDM Data Security

BRING YOUR OWN DEVICE

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Productive and Secure Enterprise Mobility with Cisco and Citrix

Mobile Application Platform

Is It Time To Refresh Your Wireless Infrastructure?

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

IBM MobileFirst Managed Mobility

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

What Is Cisco Mobile Workspace Solution?

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Google Identity Services for work

The Expanding Role Of Mobility In The Workplace

Guideline on Safe BYOD Management

Moving to the Cloud: What Every CIO Should Know

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

enterprise social collaboration for a better way of working Your business technologists. Powering progress

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

Total Enterprise Mobility. Norbert Elek

Transcription:

Instant, Secure and Accountable Enterprise Mobility Management 101 Why a complete Enterprise Mobility Management strategy is crucial in today s mobile-first workplace Executive Summary Mobile devices have transformed the way we interact with applications and content in our personal lives leading to users wanting that same experience at work. Employees are working at all times and from all locations whether from a remote office, customer site, home or while traveling. To meet employees demands for consumer devices, IT can now turn to enterprise mobility management solutions that maintain information security, separate personal from professional workspaces and monitor device usage. A complete EMM strategy combines a mobile-first instant communication solution with the control afforded by leading EMM services. ENTERPRISE MOBILITY MANAGEMENT 101 1

A Revolution is Underway Mobile phones have become smarter and more ubiquitous, flooding the workplace with new devices (consumerization of IT), creating a mobile mindshift and the bring-your-own-device (BYOD) trend. Employees are happier and more productive when they have mobile access to their email, apps and data on tablets and phones. More and more organizations are creating robust mobile environments that support employee choice. Becoming a mobile enterprise means new opportunities for your organization to gain competitive advantage and drive top-line growth. 78% of organizations allow employee-owned mobile devices in the business environment. 1 This consumer-driven revolution is providing the workforce with faster, more comfortable ways to communicate. There is now an expectation that workers can be productive whenever and wherever they are. The power is in the people s hands, but not without serious issues. Social behaviors are allowing employees to skirt the rules, since their primary concern is usually productivity, not security. The IT corporate landscape now has a new need: to ensure that employees have secure and reliable access to mobile devices and apps. The cost, security risks and mission-critical nature of mobility weighs heavily on the minds of CIOs and decision makers. The market has responded by developing sophisticated systems designed to reduce the IT effort needed to support this broad mobile device use. Enterprise Mobility Today 1. Citrix Whitepaper, 6 Steps to Enterprise Mobile Device Management, 2014 Mobile devices are powerful tools, enabling quick access to networks, services and applications. This flexibility allows for infinite possibilities to access information that was never possible before. Mobility is no longer limited to niche groups it is a fundamental requirement for people throughout the entire enterprise. Devices in the enterprise are not only skyrocketing in volume but are also expanding beyond the executive suites to rank-and-file employees. This new paradigm offers great potential to improve how we all work, if managed properly. Because of the productivity benefits employees gain from smartphones, IT managers must respond to overwhelming requests to support new devices. ENTERPRISE MOBILITY MANAGEMENT 101 2

Work happens from many locations and devices. The number of apps on each device is increasing as well. The mobile analytics firm, Asymco reported an average of 60 apps per ios device. Given that over half of organizations are supporting more than one device type, the exposure of the corporate network to potentially non-compliant or malicious apps is immense. Users often try to cope with the lack of tools in their enterprise mobility toolset by turning to texting and cloud services like imessage, WhatsApp and Dropbox. In fact, 70 percent of companies know or suspect their employees are using consumer messaging or file sharing services without IT s knowledge or control 2. 61% of information workers now work outside the office. 3 These work arounds create several problems: Any data or files copied to the device itself will not be encrypted. When these vendors say they provide security, they are only talking about data in the cloud not on the individual devices. Any information stored in a personal account is out of IT s control, so you can t manage or audit who it is shared with or how it is accessed. Data on lost or stolen devices has the potential to be compromised. If an employee leaves the company, IT might find it hard to retrieve and delete the information he had on his device. Enterprise IT staff need a strategy on how to stay ahead of the constant changes, in order to avoid creation of new silos, while taking the opportunity to lead business with innovation. Mobile evice management (MDM) is an essential capability to enable secure enterprise mobility and unleash the power of mobile, but it is only the tip of the spear. Enterprise mobility management (EMM) has picked up where MDM falls short and is still evolving. 2. Enterprise Strategy Group Whitepaper, Online File Sharing and Collaboration: Security Challenges and Requirements, August 2012 3. Citrix Whitepaper, Jump Start Mobile Productivity with MDM and Secure File Sharing, 2014 ENTERPRISE MOBILITY MANAGEMENT 101 3

Data protection is a major concern. What exactly is MDM / EMM? Since the growth of mobility has triggered such a rapid transformation of IT, there are many opportunities to provide greater capabilities for users and deliver benefits to the organization, including productivity improvements, new service creation and reduced management costs. 67% Many companies are struggling to manage an increasingly complicated mix of employee-owned and corporate-provided devices while trying to standardize enterprise applications and workflows. It is a very difficult task. Multiple devices, running across platforms and operating systems create significant risk and complexity from securing data and devices to managing legal and financial risks. of technology decision makers say the lack of data protection capabilities on mobile devices concerns them. 4 Without additional headcount, training and other resources, IT staff will not be able to support these complex environments. To help overcome this challenge, IT is deploying mobile management software to protect their enterprise. This software allows administrators to manage mobile devices and content relatively easily. The initial solution developed is called MDM: Mobile Device Management (MDM) MDM is an industry term for the administration of mobile devices, such as smartphones, tablets and laptops when linked to a corporate network. 3. Citrix Whitepaper, Jump Start Mobile Productivity with MDM and Secure File Sharing, 2014 Traditionally, MDM allows admins to manage and secure mobile devices across multiple mobile service providers and operating systems. MDM is focused on the devices themselves. This was found to be limited, especially because most MDM services do not allow for content monitoring and application development. The need for greater control of devices and their content and applications led to the development of a more comprehensive toolkit, EMM. ENTERPRISE MOBILITY MANAGEMENT 101 4

Enterprise Mobility Management (EMM) EMM is the set of people, processes, and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context. This is an emerging discipline within the enterprise that has become increasingly prevalent over the past few years as major MDM providers sought to differentiate themselves by adding on more features to meet IT requirements. EMM keeps work data secure, while being separate from personal data. EMM typically includes all of the standard MDM features, but is combined with additional security services and tools to create a more complete solution. This greater level of control and protection allows admins to manage devices, content and applications while keeping personal and business data separate. Now users can bring their own devices and not have to worry about mixing the two, or about giving their company control of personal data. The added features within EMM typically include utilities to monitor device usage, reporting of business intelligence and auditable logs, integration with system management tools and even the ability to develop compatible in-house apps. The main challenges of determining the right enterprise mobility strategy for an organization is to relate the available mobile IT resources to the overall purpose of the work conducted. It must be determined how closely the business process should be aligned with mobile IT strategy and how to support mobile workers when they are using these devices in the workplace. work personal ENTERPRISE MOBILITY MANAGEMENT 101 5

What Does a Good EMM Implementation Offer? IT security professionals are largely warming up to MDM solutions. However, EMM solutions need to deliver on key criteria to benefit your business. the range of mobile challenges listed previously requires a new, morecomprehensive security framework one that goes beyond the basic lock-andwipe capabilities found in MDM solutions. EMM has emerged as the future of mobile management. MDM solutions that focus on device management are starting to grow into broader EMM solutions to better capture the mobile opportunity and provide more robust levels of support. MDM and EMM solutions help mature overall mobile strategies. According to the Q3 2014 Forrester Wave: Enterprise Mobile Management report, there are four key emerging areas that EMM solutions must deliver on. 1. A better employee experience 2. Enhanced reputation services Technology management is increasingly being judged on the experience employees have with corporate technology. Application reputation services allow companies to accurately determine application risk via detection of malicious behavior and allow them to understand the behaviors affecting application privacy. 3. Expanded analytics 4. More autonomous support More devices, platforms, applications, and data access mean a more complex environment for I&O pros to manage, and without additional headcount, skill sets, and other resources, you will not be able to support this complex environment. As mobile devices become more critical business tools for employees, demand for more and broader support options will increase. New enterprise mobility can enhance individual productivity, security, and business agility, by delivering the right application and information service, regardless of location and devices balancing control and innovation. ENTERPRISE MOBILITY MANAGEMENT 101 6

Top 5 Things to Consider in Your EMM Strategy When considering an implementation of an EMM strategy, it is important to keep the following considerations in mind: 1. Employees main concern is productivity - not security Your workers will use whichever apps they need to get the job done. Efficiency is king, but it means security suffers. 2. Consumer apps are a sieve for corporate data You do not know how or where consumer apps store your corporate data. You need solutions that are built for business. 3. Mobile workers will not use inferior mobile tools Employees use what works best. Give them modern, user-friendly solutions and watch as productivity and employee satisfaction skyrocket. 4. Users and IT have distinct mobile needs Employees need seamless sharing IT needs it to be secure. Employees need mobile workflows IT needs a simple implementation. The best solution works for both sides. 5. Blacklisting apps is not scalable Apps are updated constantly and keeping a list of acceptable and unacceptable app options is neither practical nor feasible. The right mobile communication solution provides complete flexibility without impacting personal use or exposing corporate data to loss or theft. Give your employees access to the apps they know and love. Give your IT team an unbeatably secure infrastructure. ENTERPRISE MOBILITY MANAGEMENT 101 7

Add a Secure Messaging Layer to Complete Your EMM Solution Lua is a core component in a complete EMM strategy. Lua was built to empower organizations to communicate efficiently and effectively no matter where employees are and on what device, while taking security and separation of work from personal just as seriously as EMM services. Lua is a key part of an overall EMM strategy and complementary to an MDM implementation. Adding Lua strengthens the ability to equip each worker with the full access they need, no matter where they are located. While the EMM solution might offer secure email, and secure browsing, Lua adds fast and equally secure messaging to that, so your organization actually has a communication tool that can keep up with its high pace. Lua takes critical communication out of overloaded inboxes and gives each and every employee direct access to all the right people. And for management, while MDM offers a technical look at device usage for IT, Lua brings to the table even more useful business intelligence with its Insights dashboard that shows staff responsiveness, cross-departmental interaction and critical concentration of activity, and provides a way to actually strengthen the organization by making communication more accountable. Throughout, Lua maintains the same level of security, administrative control and separation of work from personal as an EMM solution, so you can keep the organization set up the way you want. ENTERPRISE MOBILITY MANAGEMENT 101 8

The enterprise communication solution. Instant, secure, and accountable. www.getlua.com learnmore@getlua.com