Mobile Device Management: A Real Need for the Mobile World

Similar documents
BYOD: BRING YOUR OWN DEVICE.

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Securing Today s Mobile Workforce

Managing Windows 8.1 Devices with XenMobile

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

The Future of Mobile Device Management

Quick Heal Mobile Device Management. Available on

Security Solutions for Mobile Users in the Workplace

Five Tips to Mastering Enterprise Mobility

XenApp, XenDesktop and XenMobile Integration

Managing Devices and Corporate Data on ios

Six steps to control the uncontrollable

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

What is a mobile protection product?

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

The Device Has Left the Building

2013 InterWorks, Page 1

device management solution

ios Deployment Overview for Enterprise

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Enterprise Security Solutions by Quick Heal. Seqrite.

Microsoft 365 Business FAQs

Mobile Security using IBM Endpoint Manager Mobile Device Management

Securing the SMB Cloud Generation

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Enterprise Mobile Management (EMM) Policies

BIG IDEAS FOR SmAll BuSInESS:

Managing BYOD Networks

Keep Cyber Threats from Destroying Your Company

RHM Presentation. Maas 360 Mobile device management

CompTIA Mobility+ Certification

AirWatch for Android Devices for AirWatch InBox

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Make security part of your client systems refresh

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Enterprise Security Solutions by Quick Heal. Seqrite.

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Whitepaper. 10 Reasons to Move to the Cloud

Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

Securing Health Data in a BYOD World

Google Identity Services for work

Best Practices Guide to Electronic Banking

Bring Your Own Device

Go mobile. Stay in control.

3-Part Guide to Developing a BYOD Strategy

Secure Access for Microsoft Office 365 & SaaS Applications

Wi-Fi Cost Index. The Impact of Mobility Costs to Your Organization , fx

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

A company built on security

Mobility, Security Concerns, and Avoidance

IT & DATA SECURITY BREACH PREVENTION

The security challenge in a mobile world

Keep Cyber Threats From Destroying Your Clients Business

Protecting Health Information

Phil Schwan Technical

Trustlook Insights Q BYOD Trends & Practices

Managed IT Services Eliminating technology pains for SMBs

Mobile Devices prioritize User Experience

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Exclusive Selling Mobility with Security

Information Security BYOD Procedure

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

ipad in Business Mobile Device Management

Mobilize your corporate content and apps

Trinity Multi Academy Trust

VIRTUSA BYOD PROGRAM

Bring Your Own Device (BYOD) Best Practices & Technologies

AirWatch for Android Devices for Skype for Business

AirWatch for ios Devices

MaaS360 Secure Productivity Suite

Streamline IT with Secure Remote Connection and Password Management

Tutor Lead Session Image Storage and the Cloud.

SECURING DEVICES IN THE INTERNET OF THINGS

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

3CX Mobile Device Manager

Securing Corporate Data on Mobile Devices

MOBILITY ACCESS. SITA/iPass WiFi. By: Viraj Suralia 03 Feb 2017

SECURE, CENTRALIZED, SIMPLE

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

Welcome to the era of the anywhere worker

Why you MUST protect your customer data

Changing face of endpoint security

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Augmenting security and management of. Office 365 with Citrix XenMobile

Enterprise Mobility Management Buyers Guide

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

Transcription:

Mobile Device Management: A Real Need for the Mobile World

In today s modern workplace, employees are utilizing a variety of mobile devices both in and out of the office. Gone are the days when employees were tethered to their desktop PC they can now do business from virtually anywhere at any time. From smartphones to tablets, mobile devices bring added freedom to employees, but they also create an additional security risk for IT networks. Every single time an employee uses an unsecured mobile device to connect to corporate IT networks, they invite data theft into the organization. That s why mobile device management (MDM) is absolutely critical to the security of sensitive information. What is Mobile Device Management (MDM)? Before diving into why MDM is so critical, it s important to understand exactly what MDM entails. Mobile device management (MDM) software monitors, secures and manages mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes data and configuration settings for a variety of mobile devices, including smartphones, tablets, laptops, mobile printers, POS devices and more. This applies to both company-owned and employee-owned BYOD (Bring Your Own Device) devices.

Mobile Threats 1Pose Critical Risk Mobility threats are everywhere. Whether a device is lost or stolen, unauthorized users can easily access an unsecured device and confidential data simply by pressing a few buttons. Whether your clients embrace a Bring Your Own Device (BYOD) model or provide devices to their employees, it s absolutely critical to protect their IT infrastructure against security breaches and safeguard the confidential information that can be accessed if a mobile device is lost or stolen. Common mobility threats include: Unauthorized access to corporate data via public Wi-Fi networks Mobile malware infecting corporate systems Loss of sensitive company data stored on devices that are lost or stolen One of the biggest hurdles to overcome is convincing organizations that they need MDM. Oftentimes, the added expense or effort seems too daunting, especially for smaller companies with only a handful of devices connecting to their network. To prove the need for greater mobile security, Symantec, a leader in storage software, antivirus software, online authentication software and online verification certificates, conducted a study called The Smartphone Honey-Stick Project 1. This experiment intentionally lost 50 smartphones each had been programmed with simulated personal and corporate data, along with remote monitoring capabilities to see what would happen when the devices were found. The findings of the experiment showed: 96% of lost smartphones were accessed by the finders of the devices 89% of devices were accessed for personal related apps and information 83% of devices were accessed for corporate related apps and information 70% of devices were accessed for both business and personal related apps and information In summary, unsecured mobile devices offer a direct portal into confidential data. The good news is you can stop the threat.

2Stopping Mobile Threats Clearly, there is great risk to having unsecured mobile devices connecting to a corporate IT network. A comprehensive MDM solution makes it easy to safeguard against threats, whether mobile devices are employee-owned or company-provided. MDM not only prevents unauthorized data access, it can also provide a number of benefits that reduce the risk of mobility threats, including: Require passcodes on all devices Require devices to auto-lock after a set time period Set passcode length and reuse restrictions Auto-lock or auto-wipe devices after a set number of failed log-in attempts Enforce browser security settings Locate lost mobile devices with geo-tracking Half of the workforce is expected to use smartphones by 2013. IT World 2

3Mobile Device Management: More Than Security Besides the security aspects of MDM, IT service providers gain other benefits as well. By controlling and protecting the data and configuration settings for all mobile devices accessing the network, MDM can reduce support costs, business risks and client downtime. Other benefits include: Optimizes functionality of a mobile communications network It s no longer a question of whether IT departments will support and embrace consumer-first devices, bring-yourown-device (BYOD) programs and the expanded sphere of mobile platforms now, the issue is more about when and how. Computerworld 3 Reduces stress on overloaded IT departments Costs less when incorporated into existing managed services plans vs. standalone MDM solutions Generates additional revenue for managed service providers and other IT service professionals Plus, when policies are in place to ensure mobile devices are properly configured and secured before access to the corporate IT network is permitted, corporations are more likely to allow employee-owned devices inside the corporate firewall. As a result of the device management capabilities provided through MDM, employees are now empowered to choose the mobile device they prefer instead of being forced into particular brands or models by the IT department. Lastly, IT service providers can use MDM to manage the devices over-the-air with minimal interruption to employee schedules.

4What to Look For In an MDM Tool Shopping for the right MDM tool is easy when you know what to look for. When reviewing an MDM tool, look for one that integrates with your remote monitoring and management (RMM) solution and professional service automation software (PSA) to provide maximum efficiency and productivity. An MDM tool should also offer a comprehensive list of options, such as the ability to: Safely enroll new or existing devices over-the-air (OTA) login attempts before all data on the device is erased LabTech Software, the developer of a powerful remote monitoring and management (RMM) platform, recently introduced MDM to serve the growing mobile market. LabTech MDM allows IT service providers to manage and secure Android and Apple ios mobile devices remotely, safely and efficiently throughout their entire lifecycle. Configure one or multiple devices to enforce company policies and procedures Collect and analyze relevant hardware and software data, such as device type, model, serial number, memory and installed apps Capture carrier network, phone number and data roaming settings Secure client networks through safety policies and restrictions Enforce restrictions, such as access to app stores, use of the camera and browser security Define password complexity for unlocking devices, as well as the number of failed Centrally manage all mobile devices across all customer sites from a single interface Safely apply corporate settings, including Microsoft Exchange, Wi-Fi, VPN, LDAP, and configure and apply third party email such as POP and IMAP Pinpoint the physical location of a mobile device with geographical location lookup Easily take a screenshot of a problem area and attach it to a support ticket for faster troubleshooting and support Allow for data plan management, including alerting when activity spikes occur to avoid costly overage charges

How to Sell MDM to Your Customers 5Once you ve embraced MDM, it s time to sell the idea to your customers. Ask any IT service provider and they ll tell you selling the idea of MDM is extremely difficult. But it doesn t have to be. A major MDM challenge is placing a specific value on abstract benefits, such as improved customer service, more secure IT networks and regulatory compliance. Selling MDM is just a matter of validating the business benefits that will create greater ROI for the company. The best way to do this is to provide specific data or scenarios that make it difficult to deny the value of MDM. Provide your customers with education and marketing assets that explain the risks associated with mobile device use in corporate environments. Provide specific use cases that they can relate to, such as a dentist who lost a tablet that wasn t password protected and contained confidential patient files. Or the salesperson that left his smartphone at the coffee shop that contained a business application where he stored all of his confidential client contracts. Or the secretary who installed a malicious application that contained malware, which then spread through the company s IT network via Exchange. MDM Pricing Best Practices Pricing MDM varies depending on the needs of the client. The most popular pricing strategy among IT professionals is to add full MDM services to existing managed service contracts. There are a variety of possible pricing models within this approach, including: Flat Rate One option to consider is charging a flat fee per mobile device. The average per device charge is $5, with some IT service providers charging as little as $2 per device and others charging up to $10 per device. Variable Rate Variable pricing comes into play when IT professionals provide services to clients of varying sizes and in various industries. For instance, a client with only 10 mobile devices to support might be charged $10 per device, whereas a client with 100 or more mobile devices might be charged a lower $2-5 per device. Primary Device Rate Some IT professionals are finding that their clients are replacing laptops with tablets where practical, such as in sales environments where outside salespeople need the convenience of a tablet or in cases where a mobile device is needed primarily for looking at charts or doing data entry through terminal services in, for example, a physical therapy clinic. In these cases, when a tablet is the primary device, service providers are charging a premium of $25 or more per mobile device. For clients who are not ready to pay a monthly fee for MDM services, it is suggested that MDM agents be pushed out to their employee and companyowned mobile devices at no charge. Then if a mobile device is lost or stolen, the IT professional can attempt to locate the device and/or perform a complete wipe of the device for a onetime per incident charge.

6The mobile workforce is continuously changing. Each day, It s new opportunities pave the way for new technology (and vice versa). The mobile industry is constantly evolving to meet the growing needs of corporations will you be ready? The Future of MDM critical that IT service providers stay current on technological innovations. Consider an MDM solution that can easily adapt to a fluid landscape. Long-term success will require some degree of integration between MDM and the rest of your IT infrastructure and processes.

Summary Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security threats, ensures policy compliance and regulates employee behavior without getting in the way of business. An MDM solution allows users to continue using their devices to increase productivity and efficiency, without worrying about security threats. Now is the time to get MDM don t wait until it s too late. About LabTech Software LabTech Software is the brainchild of a managed service provider (MSP) that struggled with the usual challenges and inefficiencies of a reactive IT maintenance and support model. LabTech its flagship solution was born of the urgent need to eliminate technician inefficiencies and the desire to provide preventive and proactive service. Developed with cutting-edge, agent technology, LabTech is the only remote monitoring and management (RMM) platform created by system administrators for system administrators to automate your IT services and eliminate inefficiencies. For more information, please visit labtechsoftware.com or call 877.522.8323. 1 Symantec. The Symantec Smartphone Honey Stick Project. 2012. 2 Linke, Rebecca. Spotlight on mobile device management. ITworld. 2012, September 28. http://www.itworld.com/mobile-wireless/299220/spotlight-mobile-device-management 3 Faas, Ryan. Mobile device management what you should know. Computerworld. 2011, December 8. 4110 George Road, Suite 200 Tampa, Florida 33634 877.522.8323 labtechsoftware.com