As bring your own device (BYOD) continues to find its niche in the modern enterprise, IT is forced to answer some difficult questions.
How can we support our users to access corporate information remotely while protecting our data How do we track the various devices/platforms they’re using? How do we ensure mobile policies and regulations are being enforced?
With shrinking budgets and fewer resources, IT’s next great challenge is to provide quality services to end users without jeopardizing valuable corporate assets. Expanding workplace accessibility must be balanced against increased off-premise security in order to support mobile application delivery. Below is a list of the top 3 pros and cons of BYOD’s impact to an enterprise’s IT strategy:
- 85% increased employee satisfaction
- 74% Improved user productivity
- 62% expanded access to mobile applications
- 76% reported increased security issues
- 73% identified additional support complexity
- 59% indicated application delivery issues
While BYOD continues to innovate, so do the solutions required to manage enterprise BYOD. Mobile Device Management has evolved into Enterprise Mobility Management as the need for more advanced application and content management solutions arose; however not every organization requires the most robust set of tools. Below is a short list of solutions that comprise each of these solution areas.
Mobile Device Management
MDM concerns itself more specifically with the remote management of a specific mobile device. For example, should an employee lose his/her device, then IT can wipe to avoid confidential data being made public. At its core, MDM consists of hardware inventorying, mobile application management and deployment and OS configuration. Some solutions which align with the MDM space include:
Few solutions offer true Single Sign-on (SSO) functionality that bridge the gap between platforms, applications, and devices. Centrify’s Unified Identity Service consolidates the number of credentials IT has to manage per user, making the number of devices that user utilizes irrelevant from a management standpoint since their credentials will be consistent over each device and across applications.
Centrify’s mobile first strategy leverages either Windows Group Policy or Centrify Policy Services to centrally manage and secure corporate owned mobile devices. IT can remotely wipe any jail-broken/compromised devices, or locate any lost or misplaced devices as part of Centrify’s basis MDM solution.
Microsoft Intune integrates data protection and compliance capabilities across personal and corporate-owned devices. Through integration with System Center 2012 Configuration Manager, IT can manage PCs, Macs, Unix/Linux servers, as well as mobile devices, all from a single management console.
Microsoft InTune also has the added advantage of being an integral component to the Enterprise Mobility Suite (EMS) – a cost effective license agreement consisting of:
Hybrid Identity Management enabled by Azure Active Directory Premium
- Self service password reset
- Multi-factor authentication options
- Group based provisioning
- SSO for SaaS apps
- Security reports for visibility and threat management
Mobile Device Management enabled by Microsoft Intune
- Application management across devices
- Broad support across virtually any OS
- Greater security for users
Information Protection enabled by Azure Rights Management Service
Enterprise Mobility Management
EMM takes MDM to the next level by utilizing more robust application and content management suites in addition to device management. EMM leverages policy and configuration management tools through a mobile application management console. Some examples of more robust EMM solutions include:
VMware acquired AirWatch in February 2014 to complement its datacenter virtualization technology, making MDM a natural extension. AirWatch will function as a separate business entity despite residing within VMware’s product portfolio.
AirWatch differentiates itself with an advanced integration and partner ecosystem supporting a common development platform. AirWatch even stepped out as an industry leader by offering same-day support for the iOS 8 update in September 2014.
Founded in 2007, MobileIron steps out on our list as the solution provider focused solely toward optimizing mobile IT workloads. MobileIron’s architecture platform is comprised of three key interlocking products:
- MobileIron Sentry – An in-line gateway that manages, encrypts, and secures traffic between the mobile device and back-end enterprise systems.
- MobileIron Client – After downloading the application, MobileIron Client automatically configures the device to function in an enterprise environment by enforcing the configuration and security policies set by IT.
- MobileIron Core – Integrates with backend enterprise IT systems, enabling IT to define security and management policies.
To learn more about how Mobile Device Management solutions and Enterprise Mobility Management suites can optimize your organization’s mobile future, click the banner below to schedule an appointment with one of our Technical Specialists.