The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Similar documents
Securing Today s Mobile Workforce

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

Improve Mac Integration in your Organization: GroupLogic s ExtremeZ-IP Outperforms Mac OSX SMB-Client in Recent Benchmark Study

Rethinking MDM in a BYOD World

Managing Windows 8.1 Devices with XenMobile

The Future of Mobile Device Management

Enterprise Mobility Management Buyers Guide

Taking Care. of B usiness. Why the time is now to give your employees the mobile devices they really want. And why the right partner matters.

BYOD: BRING YOUR OWN DEVICE.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Managing Devices and Corporate Data on ios

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Mobile Device Management: A Real Need for the Mobile World

3-Part Guide to Developing a BYOD Strategy

MDM and beyond: Rethinking mobile security in a BYOD world

Mobile Security using IBM Endpoint Manager Mobile Device Management

Apple Device Management

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

MObile. end. complexity

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

MaaS360 Secure Productivity Suite

The Device Has Left the Building

Apple OS Deployment Guide for the Enterprise

BIG IDEAS FOR SmAll BuSInESS:

Securing Corporate Data on Mobile Devices

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Quick Heal Mobile Device Management. Available on

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Cisco VXI Smart Solution with VMware View

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

XenApp, XenDesktop and XenMobile Integration

INDIA The Changing Face of the Workplace: Going Light and Mobile

What is a mobile protection product?

The Connected Worker and the Enterprise of Things

The security challenge in a mobile world

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Using the Network to Optimize a Virtualized Data Center

SAP Runs SAP: Using Afaria to Provision, Manage, and Secure Employees Mobile Devices

BYOD Business year of decision!

Mobile Device Management: Strategies for Success. Speaker: Keith Leone

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Protecting Health Information

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Bring Your Own Device (BYOD) Best Practices & Technologies

How to Evaluate a Next Generation Mobile Platform

EM L01 Introduction to Mobile

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Enterprise Mobile Management (EMM) Policies

Mobile Devices prioritize User Experience

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Mobility Advantage: Why Secure Your Mobile Devices?

Securing Health Data in a BYOD World

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Six steps to control the uncontrollable

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Go mobile. Stay in control.

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Enterprise Mobility. BEYOND MDM: A MULTIDIMENSIONAL MOBILITY STRATEGY Why device-centric strategies no longer meet today s mobility needs

Enterprise Mobility Management

BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT

Consumerization: What It Means to IT Operations

Microsoft IT deploys Work Folders as an enterprise client data management solution

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Mobility best practice. Tiered Access at Google

Make security part of your client systems refresh

Disk Encryption Buyers Guide

A Guide to Closing All Potential VDI Security Gaps

white paper SMS Authentication: 10 Things to Know Before You Buy

Securing Office 365 with MobileIron

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

Enterprise Mobility Management: completing the EMM story

Maximize your move to Microsoft in the cloud

70% of professionals will conduct their work on personal smart devices by 2018 (Source: Gartner)

SECURE, CENTRALIZED, SIMPLE

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users

Technical Evaluation Best Practices Guide

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise.

Five Tips to Mastering Enterprise Mobility

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Enterprise Security Solutions by Quick Heal. Seqrite.

Mobile devices boon or curse

CIPHERPOST PRO. A Profitable, Essential Value-Add for Office 365

Securing Institutional Data in a Mobile World

Transcription:

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

The bring your own device (BYOD) trend in the workplace is at an all-time high, and according to a recent report by Gartner, is likely to continue to rise by epic proportions. The report called the trend an unstoppable train coming down the tracks, and estimates that 40 percent of organizations already support employee-owned mobile devices. While this trend is an incredible boon for employee satisfaction as well as enterprise productivity and ITcost savings when it comes to hardware, service and support, it also presents its own share of challenges when it comes to security. Yet this should not deter the enterprise from continuing to embrace the BYOD trend third-party solutions from companies that have long supported the integration of diverse enterprise operating environments are emerging that allow enterprise IT departments the control and peace of mind they require to ensure that BYOD does not open the door to corporate security breaches. These solutions fall under the categories of mobile device management (MDM) and mobile file management (MFM). BYOD is not the only reason to consider MDM and MFM, however. In many cases, mobile devices are provisioned by the enterprise itself. Or, some enterprises are provisioning mobile devices for specific departments and uses such as a field service or field sales deployment with an application standardized on a rugged handheld, smartphone or tablet. Such uses still require MDM and MFM to ensure the enterprise s assets and critical files are protected. In this white paper we ll discuss the how, why, and what solutions are currently available to secure and manage corporate assets like files, apps and devices in the field. We ll cover: Mobile Device Management Solutions, Mobile File Management Solutions, and Running Mobile Device Management and Mobile File Management in tandem. We ll also highlight the steps required of enterprise IT to ensure all your corporate assets are protected on your employee s mobile devices, so that both the BYOD trend and proprietary provisioning of mobile devices brings increased productivity and prosperity, not havoc, to the enterprise. 2

Mobile Device Management Securely and Easily Provision, Deploy and Manage Devices and Apps MDM and MFM: Separate but equally important for enterprise security Mobile Device Management, or MDM, enables enterprises to centrally manage and secure the mobile devices used by employees. According to Gartner s April 2011 report Magic Quadrant for Mobile Device Management Software, Enterprise MDM products and services help enterprises manage the transition to a more complex, mobile computing and communications environment by supporting security, service, software and inventory management across multiple operating-system platforms, primarily for handheld devices such as smartphones and tablets. 2 MDM applies to both enterprise-provisioned devices, as well as employee-owned devices that are brought into the enterprise. MDM software comes complete with either cloud-based or server-based management software, as well as on-device software footprints that provide secure connectivity between every device in the field and the corporate network, ensuring that IT has a complete view of every device and can manage and provision devices securely and easily. MDM gives enterprises a secure and simplified way to manage both the usability and the integrity of the myriad and multiple mobile devices used by their employees. This presents a huge value to enterprises by supporting employee productivity and freedom of choice, and further, prevents future loss of assets via unsecured, unmanaged devices. By replacing piecemeal solutions that require multiple points of oversight with one, centrally-administered solution, the cost savings is further multiplied. 3

Complete MDM solutions should give IT the ability to: Configure employee devices, such as mobile phones, tablets and even laptops according to the company s own standards; Provision email clients like Exchange or Lotus, Wi-Fi and server access; and Lock or wipe a device remotely if it is suspected of being compromised. Mobile Device Management: Made for the Enterprise The components that make up a fully-managed MDM solution, including software distribution, policy management, inventory management, security management and service management, are not new. However, their grouping together to specifically address the needs of the mobile workforce is a fairly new development. Traditionally, device management fell under the responsibility of enterprise IT departments and only included software and services as related to PCs and other hardware, while smartphones are managed by the messaging group. MDM administration can fall under either category, however, as the number of mobile devices, and the variety of mobile operating systems represented therein, expands. Solutions like those available from Good Technology made their debuts over a decade ago. However, as more companies allow for a variety of devices, including ipad, Android and others, to participate in the company network, third-party MDM solutions have evolved and more players such as MobileIron and others have made a large impact on the market. Whether running on ios, Windows, Android or Blackberry, today s MDM solutions allow for central management of all devices on the network. Currently, most MDM solutions are offered as on-premise or software-as-aservice (SaaS)-based tools. Benefits of Mobile Device Management MDM basically acts as a company-owned and managed security detail that travels with the employee s device, checking in with the corporate server to access email and other network-controlled applications and software. MDM often includes features such as enforced password protection, audit trail and logging, and remote lock and device wipe capabilities that can be issued from the corporate server to the device. Most mobile devices, such as ipad, come ready to be provisioned via MDM. 3 Limitations of Mobile Device Management While MDM allows for corporate provisioning of devices (even if they are purchased by the employee) and secures the device for email and in the event of loss or theft, it does not provide secure access to corporate files. 4

If employees are using their smartphones or tablets to access critical data such as confidential files from the corporate server MDM may not go far enough in securing enterprise assets. MDM only protects the device itself and provides a great way to provision applications and updates to those applications. It also allows applications to run in their containers, securing business applications like field service, email, field sales and more. However, to further secure the data stored and accessed on the device, or to prevent unauthorized access of data and files from corporate servers via an employee s tablet or mobile phone, MFM is required. Companies that want to deploy a large number of devices and applications and centrally-manage them will use MDM, as all devices are enrolled in this service and tracked on the server. Mobile File Management Securely and Easily Access, Edit, Store and Save Enterprise Server Files on a Mobile Device Mobile File Management, or MFM, allows businesses to manage the transfer and storage of corporate files to an employee s mobile device. It allows corporate IT to provision access to these files and whether the files can only be viewed, or also stored and saved, to the employee s device. With mobile devices such as ipad, iphone or Android phones, MFM overcomes the device s inherent lack of on-device storage by allowing corporate files to be accessed and stored within the MFM software on the device, while still giving the enterprise ultimate control over those files. While MDM can dictate that a device itself cannot be used without entering a passcode, MFM can also be configured to dictate that the software used to access, edit, or store corporate files cannot be opened (and hence, the files) without entering a passcode. Also, if the device is lost or stolen, MDM can only lock or wipe the entire device. MFM takes this a step further by locking access to the corporate server as well as corporate files stored on the device by allowing for remote wipe of the MFM container by enterprise IT. 4 Like MDM, MFM is installed on the corporate server and the device. Mobile File Management: Made for the Enterprise and the SMB Enterprise-level MFM is ideal for any company that wants to grant employees access to the corporate server and files without having them resort to unsecure, consumer solutions that allow for file transfer without corporate oversight, and With mobile devices such as ipad iphone, or Android phones, MFM overcomes the device s inherent lack of on-device storage... 5

that do not enable those same files to be simultaneously edited on the server and the device. Such MFM solutions are also beneficial to any company looking to ensure employees can access files on the corporate server via mobile phones and ipads, which do not have native file storage, without worrying about the security risks for un-provisioned access via email or consumer applications. Benefits of Mobile File Management Whether deployed in conjunction with MDM or used alone, MFM streamlines workflow, leading to increased productivity and satisfaction from employees, and eases security concerns for corporate IT departments at the same time. It s a no-brainer for any company looking to make the most of the speeding BYOD train, as well as companies that have purchased tablets or other mobile devices for their employees. For added security and peace of mind for both corporate files AND corporate devices, there s nothing like MFM and MDM working together. How Mobile Device MAnagement and Mobile File Management work together for maximum security Mobile Device Management Alone is Not Enough MFM does not require MDM. And while MDM alone leaves file access unsecure, MFM and MDM combined offer a previously unseen level of comprehensive security. Although MDM allows for access and security in devices and email provisions, it lacks secure file access and on-device storage (MFM), which is an even more critical component to security. Together, MFM and MDM allow both device and files to be safely monitored and managed by corporate IT. While centralized MDM can manage device, email and other applications, not all MDM providers allow for the provisioning of MFM applications. When considering an MDM vendor, it s important to choose one that includes MFM in the application container. In short, MDM protects the device; MFM protects the files, creating a complete security solution. So while MDM can wipe a device if it s stolen in the time between when it goes missing and when it is reported missing to the IT department, MFM ensures critical files and corporate assets cannot be accessed in the meantime. If all you need is to enable employees to securely access files, and protecting the device and corporate email is less of a concern, then MFM by itself is fine. MFM running outside a container provides the same security as if it were running inside the container. The benefit of buying a packaged MFM/MDM solution would be the additional benefit of centrally managing all applications, including MFM, in one container. 6

Mobile Device Management & Mobile File Management Together: Made for the Mobile Enterprise and Savvy SMB Currently, no MDM vendors have an application that can control files. And the few that do have low feature/function sets with little thought to scalability. So if a company is seeking the complete security that MDM and MFM offer together, they will also need to seek out a MFM solution. Industry-leading MDM vendors like MobileIron 5 and Good Technology 6 are working to offer MFM within their MDM containers. Look for MDM solutions that embed MFM within them that s key. Most enterprise-level MFM solutions will work with any, if not all MDM providers. Additionally, just as MDM can be deployed on multiple devices and operating systems within one company, enterprise-level MFM solutions now exist that are device-agnostic, and support Apple, Windows, and Android or Blackberry platforms. Benefits of Combining Mobile Device Management with Mobile File Management Specific benefits of the MDM and MFM partnership within an enterprise include encryption: if the MDM used by an enterprise is configured to allow device use only after a lock-code is entered, the MFM solution partner then allows for file access to also be encrypted. Not only can MFM be enabled to remotely wipe confidential files from a device, it can even wipe the device of the file management software. In the age of BYOD, this feature is extremely beneficial as it allows companies to remove access to corporate files from a rogue, or former, employee s device without shutting the device down completely (as MDM might do). Hence, the device remains the property of the former employee, but corporate files, as well as the software, are still controlled by the enterprise. The enterprise mobility strategy is incomplete without Mobile file management MFM does not require MDM but is needed for maximum mobile security throughout the whole of the enterprise. For enterprises just wanting secure file access, MFM is a perfectly acceptable solution that leads to maximum security. To get the most out of your MDM provider, and to ensure uncompromised security for device AND file access, you should also have an MFM solution that complements MDM. For enterprise purposes, MDM and MFM are an ideal marriage to ensure maximum security. Enterprise-level MFM solutions are the most complementary to enterpriselevel MDM. Consumer applications don t come close to allowing the meticulous configurations and provisioning required by corporate IT departments. Many of the consumer apps aren t even enterprise-ready. MDM and MFM solutions uniquely suit cross-platform enterprise environments where Windows is not the only operating system in use. The mobile enterprise train has left the station, and it s picking up speed. Are you ready with an appropriate MDM and MFM solution in mind for when the train comes rolling through your company? 7

About GroupLogic GroupLogic helps enterprise and education IT organizations simply and securely integrate diverse computing platforms into enterprise environments, connecting employees to enterprise files, content and assets to facilitate a more productive and efficient work environment. With more than two decades of experience, GroupLogic leads the marketplace in helping IT organizations effectively and easily manage the integration of Apple products into the enterprise ecosystem. Whether IT organizations are looking to integrate existing Apple assets, purchase additional Apple hardware like Macs and ipads, or want to take advantage of the hardware cost savings that accompany the adoption of IT consumerization, GroupLogic enables IT organizations to easily and securely manage the rapid integration of diverse platforms while ensuring resources are optimized. GroupLogic enables the enterprise to focus on what is really important - competitive differentiation, improved employee productivity, mitigated risk and reduced costs. GroupLogic s proven productsmobilecho, ExtremeZ-IP, ArchiveConnect, and MassTransit-are in use by some of the world s most innovative companies, including Christie s, International Greetings and Omnicom Group. For more information, visit our website www.grouplogic.com 1 http://www.appleinsider.com/articles/11/09/21/employee_owned_iphone_ipad_an_unstoppable_train_in_the_enterprise/ 2 http://www.gartner.com/technology/media-products/reprints/airwatch/211101.html 3 http://images.apple.com/ipad/business/docs/ipad_mdm.pdf 4 http://en.wikipedia.org/wiki/mobile_file_management 5 http://www.mobileiron.com/en/component/content/article/75-2011/158-mobileiron-positioned-in-the-leaders-quadrant-of-themagic-quadrant-for-mobile-device-management-software 6 http://got.good.com/2011-04-15_securemobilityformmdmquadrant.html?cid=701000000005dpz&lsrc=website&ltyp=online%20 Content&mcid=701000000005dpz&mlsrc=Website&mltyp=Online%20Content 8