SlideShare a Scribd company logo
1 of 15
Download to read offline
MDM
  Mobile Device Management:

  Your Guide
  to the Essentials
  and Beyond
Mobile Devices Are All Around You
More businesses than ever are confronting how to fully embrace
mobile devices beyond their executive and sales teams. In a way, IT
teams are being dragged into this. Many users have fully incorporated
smartphones and tablets into their daily lives thanks to devices and
operating systems from Apple and Google. They are choosing the
personal user experience of Android and iPhone over the largely
business-task-driven BlackBerry devices. They have also adopted
application stores in their personal lives, blending activities like web
browsing, games, and mobile payments with business uses such as
corporate email.

So why is it taking so long for businesses to officially assimilate mobile
devices into their organizations? It’s usually because they want to
put an IT strategy for management and operation in place first.
We understand that IT would like to add a degree of rigor, but the
             solution doesn’t have to be that difficult.

                                           This guide describes twelve
                                           best practices for Mobile
                                           Device Management (MDM).
                                           The first eight principles
                                          are the essentials that every
                                          organization needs to adopt.
                                          The last four are advanced
                                          practices that will help take
                                          your organization to the next
                                         level.


                                                                 www.maas360.com
The Essentials: Start with a Strong Foundation
                  Regardless of your business, industry or users, be sure to adopt the
                  following practices:
                     1. Be Realistic with Your Policy
                     2. Gain Insight into Who’s Mobile and What They’re Doing
                     3. Cover the Basics: Passwords, Encryption, and Remote Wipe
                     4. It’s as Easy as 1, 2, 3
                     5. Make it Simple to Get Up and Running
                     6. Let End Users Take Care of Device Management
                     7. Start Planning for Centralized Control
                     8. Spread the Word about Your Progress

                  Advanced Practices: Build Upon Your Foundation
                  Go a step further with advanced practices:

                     9. Get a Grip on Usage Costs
                     10. Automate Compliance Management

                     11. Manage Application Restrictions and Your Own Application
                         Storefront
                     12. Provide a Backup & Recovery Service




www.maas360.com          Mobile Device Management: Your Guide to the Essentials and Beyond   1
1. Be Realistic with Your Policy
                  You need to:
                       1. Support multiple device platforms

                       2. Allow personal devices

                  Frankly, nearly all organizations are doing this now. They just don’t
                  know it. Chances are good that your business has a BlackBerry corporate
                  standard, right? And that your business has at least one iPhone or iPad
                  that syncs to your email infrastructure (most likely for the CEO or
                  president) using Exchange ActiveSync® or Lotus Notes Traveler®.

                  If that’s the case, you probably have a lot more personal iOS, Android
                  and Windows Mobile devices inside your organization. After all, it’s easy
                  for any mobile device to integrate with mail infrastructure like Exchange
                  using the Activesync functionality you turned on. Just Google Setting up
                  iPhone on Exchange and see how your employees are doing it.




2   Mobile Device Management: Your Guide to the Essentials and Beyond           www.maas360.com
2. Gain Insight into Who’s Mobile and What They’re Doing
                  Making decisions and quantifying risks about mobile devices is hard
                  without good data on the mobile devices in your environment. For
                  instance, it’s not uncommon for terminated employees to still be using
                  corporate mobile devices—but you can’t stop this unless you know about
                  it.

                  With a lightweight reporting and inventory tool, you can keep tabs on how
                  mobile devices are being used and by whom. Make sure the solution:

                     • Empowers the helpdesk to troubleshoot devices
                     • Is accessible outside of IT (for example, HR should have access
                       during exit interviews to turn off devices for employees who are
                       leaving the company)
                     • Includes strong application inventory and search capabilities




www.maas360.com         Mobile Device Management: Your Guide to the Essentials and Beyond     3
3. Cover the Basics: Passwords, Encryption, and Remote Wipe
                  Be sure to do the following:

                       • Require a strong password of at least four characters
                       • Set up devices to automatically lock after 5-15 minutes of inactivity
                       • Configure devices to automatically wipe after 10 failed login
                         attempts or if they are reported lost
                       • Enable local encryption

                  Some organizations may want to consider more protection. But before you
                  put yourself in that category, ask yourself one question: Do we enforce this
                  level of security on our laptops?




4   Mobile Device Management: Your Guide to the Essentials and Beyond            www.maas360.com
4. It’s as Easy as 1, 2, 3
                  You may be worried that you’ll need a new solution to implement the
                  first three best practices. That isn’t necessarily the case. If you have a
                  BlackBerry Enterprise Server, then you are covered on that platform. And
                  with Exchange or Lotus Notes, you can enforce your PIN policy and remote
                  wipe your iPhones, iPad®s, and Windows Mobile devices. (Android™ added
                  this Exchange-based security control in version 2.2.)

                  Following the three principles we’ve already outlined is a responsible
                  approach that takes advantage of existing infrastructure for device and
                  risk management. And it’s a smart one considering that you really can’t
                  stop people in your environment from using mobile devices.

                  The biggest issue with this approach is that reporting is limited and not
                  scalable—you’ll need to develop and run reports manually, and deal with
                  the lack of a centralized view into all devices.

                  But taking the first step with reporting and inventorying can dramatically
                  improve your current posture on the uber-popular iPhone and Android
                  devices. Then you can plan a more scalable and robust management
                  and security solution (as described in the next best practices). In the
                  meantime, click here for our free ActiveSync reporting tool.




www.maas360.com          Mobile Device Management: Your Guide to the Essentials and Beyond     5
5. Make it Simple to Get Up and Running
                  Don’t make IT responsible for reviewing each request for device and
                  system access. Instead, empower users to enroll their own devices by
                  visiting a single URL. Set up a default policy that approves the users’
                  devices and pushes down their e-mail and corporate Wi-Fi profiles.

                  In addition to making the process easy for end users, simplify things for
                  IT. For example, your policy could specify that any Android device with
                         OS 2.2.4 or above is automatically granted access to corporate
                                 systems, while any Android device on an earlier OS version
                                         is automatically blocked.




6   Mobile Device Management: Your Guide to the Essentials and Beyond            www.maas360.com
6. Let End Users Take Care of Device Management
                  With employees relying on mobile devices to get their
                  jobs done, you don’t want basic device management
                  issues to get in the way of productivity. You also
                  don’t want users calling the helpdesk with issues
                  they can resolve themselves. Empower end users
                  with a self-service portal that allows them to:

                     • Enroll their devices
                     • Lock and wipe their devices if think
                       they’ve been stolen
                     • Reset their own passcodes
                     • Locate their lost devices




www.maas360.com          Mobile Device Management: Your Guide to the Essentials and Beyond   7
7. Start Planning for Centralized Control
                  Your BlackBerry Enterprise Server is probably well entrenched, both
                  operationally and economically. But it is not multi-platform, and a multi-
                  platform solution is needed to support the variety of devices in your
                  environment.

                  Consider these four emerging—and economically sound—best practices:
                       1. Adopt an MDM platform that can also manage PCs and Macs as
                          well as mobile devices. The lines between laptops, tablets, and
                          smartphones will continue to blur in both user functionality and IT
                          operations. A versatile MDM solution will cut down on infrastructure
                          costs, improve operational efficiency, and create a single user view
                          into devices and data for operations and security.

                       2. Be sure your reporting and inventory tool consolidates both your
                          existing BlackBerry and your multi-platform MDM solutions. You’ll
                          rely on your data and reports daily, and you’ll want to avoid any
                          manual processes to access your business intelligence on mobile
                          devices.

                       3. Take a look at cloud-based MDM services. When you account for
                          full Total Cost of Ownership (TCO), a LAN-oriented management
                          solution can be costly. Why use a more expensive—and wired—
                          solution to manage remote mobile devices?

                       4. Go the agent route with caution. If you can meet your needs with
                          server-side management controls, all the better. You’ll find this
                          is the better solution for the long haul, given the proliferation of
                          hardware/OS/carrier combinations. If you opt for an agent-based
                          solution, you’ll spend lots of time installing and maintaining it
                          across the mobile landscape.



8   Mobile Device Management: Your Guide to the Essentials and Beyond             www.maas360.com
8. Spread the Word about Your Progress
                  Report on and discuss your mobile device inventory and policy status—
                  including personal devices—in your IT operations reviews. It’s a good way
                  to broaden the discussion beyond those responsible for managing devices
                  in your environment. It’s also an opportunity to raise the visibility of the
                  benefits for your organization, as well as for future resource requirements
                  such as needed involvement from those responsible for security and other
                  areas of IT. Your inventory and reporting tool should make it simple to
                  produce the reports to start conversations in these meetings.

                          Designed for Any Environment
                            The practices we’ve discussed so far should meet most
                             organizations’ needs. In fact, they satisfy the most stringent
                              security and privacy regulations, such as those dictated by
                                    the HIPAA, FINRA, and PCI DSS. These regulations only
                                     require, in practice, that organizations encrypt their
                                         data and are able to destroy data on a lost device.
                                            The essential practices cover that and more.

                                                 Build Upon Your Foundation with
                                                  Advanced Practices
                                                   With the essentials in place, your organization
                                                    is primed for an effective mobile IT operation
                                                    in the near term. Now you need to determine
                                                    whether or not your organization needs to go
                                                   a step further with advanced practices.




www.maas360.com          Mobile Device Management: Your Guide to the Essentials and Beyond       9
9. Get a Grip on Usage Costs
                   You need to be able to track, monitor, and restrict network usage.
                   After all, the costs for international data roaming can reach thousands
                   of dollars per trip. Even domestic usage can quickly add up, especially
                   considering the pricing plans introduced by AT&T for iPhones and iPads in
                   2010.

                         10. Automate Compliance Management
                            IT needs a way to automatically detect devices out of compliance
                              with policy—and automatically respond. For example, your policy
                               may specify that jailbroken or rooted devices are not allowed
                                in the corporate environment and if one is detected, you will
                                 immediately revoke access to corporate systems. Ideally, the
                                  detection and revocation should happen automatically. At
                                  the same time, you want to automatically notify the user
                                  of the action being taken and what’s needed to come into
                                  compliance and regain access to corporate resources. Once
                                  the device is in compliance, access should be automatically
                                  reinstated.




10   Mobile Device Management: Your Guide to the Essentials and Beyond           www.maas360.com
11. Manage Application Restrictions and Your Own
                  Application Storefront
                  Today, most smartphone and tablet vendors do a good job of limiting
                  usage to certified and approved applications. Some would argue they do
                  too good of a job restricting access. Other vendors maintain a very open
                  policy for creating applications, with no formal process for certifying apps.
                  That said, certain organizations or industries may need to restrict the type
                  of application allowed on a corporate-approved device.

                  If you want to be proactive about it, set up your own enterprise
                  application storefront. This allows you to present a list of approved
                  applications and ease their delivery to mobile devices. Plus, your users
                  will know where to go for these applications and for updates. Some MDM-
                  solution providers can even help you deliver documents such as PDFs to
                  devices.

                  12. Provide a Backup & Recovery Service
                  If any of your users work with critical and unique data beyond email,
                  you may want to consider using a backup and recovery solution. Those
                  using an iPhone or an iPad can rely on iTunes to take care of this. Just
                  make sure your policies are set to force an encrypted backup. For those
                  not using iTunes for backup, you’ll probably need to address specific use
                  cases.




www.maas360.com          Mobile Device Management: Your Guide to the Essentials and Beyond    11
Mobility Can’t Wait
                   Mobile devices in the corporate environment are here to stay. Your
                   organization can either drag its feet while renegade devices access
                   corporate resources, or employ best practices that will satisfy end users
                   and IT. Whether you need to cover the basics or need to step up mobile
                   device management to a higher level, this guide will start you on your
                   way.

                   Interested in a free evaluation of a leading mobile device management
                   solution? Click here to take advantage of a quick and easy trial.

                       Or, check out these resources to learn more about mobile device
                           management software from Fiberlink.




                                                                   • www.maas360.com
                                                                   • Mobile Device Management
                                                                   • MaaSters Center




                                                                 All brands and their products, featured or referred to within
                                                                 this document, are trademarks or registered trademarks of
                                                                 their respective holders and should be noted as such.




12   Mobile Device Management: Your Guide to the Essentials and Beyond                                www.maas360.com
Ebook mdmessentials

More Related Content

Viewers also liked

Six Questions on the Salaita Case
Six Questions on the Salaita CaseSix Questions on the Salaita Case
Six Questions on the Salaita CaseComplex Fields
 
My intro video
My intro videoMy intro video
My intro videoMoma Lina
 
Time Conti Residential and Commercial Sales
Time Conti Residential and Commercial SalesTime Conti Residential and Commercial Sales
Time Conti Residential and Commercial Salestimecontisheffield
 
Horse Competing System
Horse Competing SystemHorse Competing System
Horse Competing SystemAffiliate Jump
 
Sagrado corazon de jesus....
Sagrado corazon de jesus....Sagrado corazon de jesus....
Sagrado corazon de jesus....tapiasospina
 
Acciona 2012 resultado anual
Acciona 2012 resultado anualAcciona 2012 resultado anual
Acciona 2012 resultado anualsindicatouit
 
Assessing the importance of geo hydrological data acquisition in the developm...
Assessing the importance of geo hydrological data acquisition in the developm...Assessing the importance of geo hydrological data acquisition in the developm...
Assessing the importance of geo hydrological data acquisition in the developm...Alexander Decker
 
Math%20112%2013.4 a4 29-10
Math%20112%2013.4 a4 29-10Math%20112%2013.4 a4 29-10
Math%20112%2013.4 a4 29-10guestd374f1
 

Viewers also liked (11)

Six Questions on the Salaita Case
Six Questions on the Salaita CaseSix Questions on the Salaita Case
Six Questions on the Salaita Case
 
My intro video
My intro videoMy intro video
My intro video
 
International House 2011
International House 2011International House 2011
International House 2011
 
Time Conti Residential and Commercial Sales
Time Conti Residential and Commercial SalesTime Conti Residential and Commercial Sales
Time Conti Residential and Commercial Sales
 
Performance Improvement - Proven Success
Performance Improvement - Proven SuccessPerformance Improvement - Proven Success
Performance Improvement - Proven Success
 
Horse Competing System
Horse Competing SystemHorse Competing System
Horse Competing System
 
Sagrado corazon de jesus....
Sagrado corazon de jesus....Sagrado corazon de jesus....
Sagrado corazon de jesus....
 
Acciona 2012 resultado anual
Acciona 2012 resultado anualAcciona 2012 resultado anual
Acciona 2012 resultado anual
 
Assessing the importance of geo hydrological data acquisition in the developm...
Assessing the importance of geo hydrological data acquisition in the developm...Assessing the importance of geo hydrological data acquisition in the developm...
Assessing the importance of geo hydrological data acquisition in the developm...
 
Lineamientos en las TIC
Lineamientos en las TICLineamientos en las TIC
Lineamientos en las TIC
 
Math%20112%2013.4 a4 29-10
Math%20112%2013.4 a4 29-10Math%20112%2013.4 a4 29-10
Math%20112%2013.4 a4 29-10
 

More from wardell henley

RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfwardell henley
 
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfLandscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfwardell henley
 
Facets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfFacets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfwardell henley
 
self_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfself_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfwardell henley
 
Itil a guide to cab meetings pdf
Itil a guide to cab meetings pdfItil a guide to cab meetings pdf
Itil a guide to cab meetings pdfwardell henley
 
9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmpwardell henley
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paperwardell henley
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingwardell henley
 
213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmenwardell henley
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178wardell henley
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securitywardell henley
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01wardell henley
 
Splunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardsSplunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardswardell henley
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguidewardell henley
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Managementwardell henley
 

More from wardell henley (20)

RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
 
mita_overview.pdf
mita_overview.pdfmita_overview.pdf
mita_overview.pdf
 
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfLandscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdf
 
Facets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfFacets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdf
 
self_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfself_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdf
 
Itil a guide to cab meetings pdf
Itil a guide to cab meetings pdfItil a guide to cab meetings pdf
Itil a guide to cab meetings pdf
 
Mn bfdsprivacy
Mn bfdsprivacyMn bfdsprivacy
Mn bfdsprivacy
 
9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp
 
It security cert_508
It security cert_508It security cert_508
It security cert_508
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paper
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen
 
Soa security2
Soa security2Soa security2
Soa security2
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
 
Splunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardsSplunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandards
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguide
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Management
 
oracle EBS
oracle EBSoracle EBS
oracle EBS
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Ebook mdmessentials

  • 1. MDM Mobile Device Management: Your Guide to the Essentials and Beyond
  • 2. Mobile Devices Are All Around You More businesses than ever are confronting how to fully embrace mobile devices beyond their executive and sales teams. In a way, IT teams are being dragged into this. Many users have fully incorporated smartphones and tablets into their daily lives thanks to devices and operating systems from Apple and Google. They are choosing the personal user experience of Android and iPhone over the largely business-task-driven BlackBerry devices. They have also adopted application stores in their personal lives, blending activities like web browsing, games, and mobile payments with business uses such as corporate email. So why is it taking so long for businesses to officially assimilate mobile devices into their organizations? It’s usually because they want to put an IT strategy for management and operation in place first. We understand that IT would like to add a degree of rigor, but the solution doesn’t have to be that difficult. This guide describes twelve best practices for Mobile Device Management (MDM). The first eight principles are the essentials that every organization needs to adopt. The last four are advanced practices that will help take your organization to the next level. www.maas360.com
  • 3. The Essentials: Start with a Strong Foundation Regardless of your business, industry or users, be sure to adopt the following practices: 1. Be Realistic with Your Policy 2. Gain Insight into Who’s Mobile and What They’re Doing 3. Cover the Basics: Passwords, Encryption, and Remote Wipe 4. It’s as Easy as 1, 2, 3 5. Make it Simple to Get Up and Running 6. Let End Users Take Care of Device Management 7. Start Planning for Centralized Control 8. Spread the Word about Your Progress Advanced Practices: Build Upon Your Foundation Go a step further with advanced practices: 9. Get a Grip on Usage Costs 10. Automate Compliance Management 11. Manage Application Restrictions and Your Own Application Storefront 12. Provide a Backup & Recovery Service www.maas360.com Mobile Device Management: Your Guide to the Essentials and Beyond 1
  • 4. 1. Be Realistic with Your Policy You need to: 1. Support multiple device platforms 2. Allow personal devices Frankly, nearly all organizations are doing this now. They just don’t know it. Chances are good that your business has a BlackBerry corporate standard, right? And that your business has at least one iPhone or iPad that syncs to your email infrastructure (most likely for the CEO or president) using Exchange ActiveSync® or Lotus Notes Traveler®. If that’s the case, you probably have a lot more personal iOS, Android and Windows Mobile devices inside your organization. After all, it’s easy for any mobile device to integrate with mail infrastructure like Exchange using the Activesync functionality you turned on. Just Google Setting up iPhone on Exchange and see how your employees are doing it. 2 Mobile Device Management: Your Guide to the Essentials and Beyond www.maas360.com
  • 5. 2. Gain Insight into Who’s Mobile and What They’re Doing Making decisions and quantifying risks about mobile devices is hard without good data on the mobile devices in your environment. For instance, it’s not uncommon for terminated employees to still be using corporate mobile devices—but you can’t stop this unless you know about it. With a lightweight reporting and inventory tool, you can keep tabs on how mobile devices are being used and by whom. Make sure the solution: • Empowers the helpdesk to troubleshoot devices • Is accessible outside of IT (for example, HR should have access during exit interviews to turn off devices for employees who are leaving the company) • Includes strong application inventory and search capabilities www.maas360.com Mobile Device Management: Your Guide to the Essentials and Beyond 3
  • 6. 3. Cover the Basics: Passwords, Encryption, and Remote Wipe Be sure to do the following: • Require a strong password of at least four characters • Set up devices to automatically lock after 5-15 minutes of inactivity • Configure devices to automatically wipe after 10 failed login attempts or if they are reported lost • Enable local encryption Some organizations may want to consider more protection. But before you put yourself in that category, ask yourself one question: Do we enforce this level of security on our laptops? 4 Mobile Device Management: Your Guide to the Essentials and Beyond www.maas360.com
  • 7. 4. It’s as Easy as 1, 2, 3 You may be worried that you’ll need a new solution to implement the first three best practices. That isn’t necessarily the case. If you have a BlackBerry Enterprise Server, then you are covered on that platform. And with Exchange or Lotus Notes, you can enforce your PIN policy and remote wipe your iPhones, iPad®s, and Windows Mobile devices. (Android™ added this Exchange-based security control in version 2.2.) Following the three principles we’ve already outlined is a responsible approach that takes advantage of existing infrastructure for device and risk management. And it’s a smart one considering that you really can’t stop people in your environment from using mobile devices. The biggest issue with this approach is that reporting is limited and not scalable—you’ll need to develop and run reports manually, and deal with the lack of a centralized view into all devices. But taking the first step with reporting and inventorying can dramatically improve your current posture on the uber-popular iPhone and Android devices. Then you can plan a more scalable and robust management and security solution (as described in the next best practices). In the meantime, click here for our free ActiveSync reporting tool. www.maas360.com Mobile Device Management: Your Guide to the Essentials and Beyond 5
  • 8. 5. Make it Simple to Get Up and Running Don’t make IT responsible for reviewing each request for device and system access. Instead, empower users to enroll their own devices by visiting a single URL. Set up a default policy that approves the users’ devices and pushes down their e-mail and corporate Wi-Fi profiles. In addition to making the process easy for end users, simplify things for IT. For example, your policy could specify that any Android device with OS 2.2.4 or above is automatically granted access to corporate systems, while any Android device on an earlier OS version is automatically blocked. 6 Mobile Device Management: Your Guide to the Essentials and Beyond www.maas360.com
  • 9. 6. Let End Users Take Care of Device Management With employees relying on mobile devices to get their jobs done, you don’t want basic device management issues to get in the way of productivity. You also don’t want users calling the helpdesk with issues they can resolve themselves. Empower end users with a self-service portal that allows them to: • Enroll their devices • Lock and wipe their devices if think they’ve been stolen • Reset their own passcodes • Locate their lost devices www.maas360.com Mobile Device Management: Your Guide to the Essentials and Beyond 7
  • 10. 7. Start Planning for Centralized Control Your BlackBerry Enterprise Server is probably well entrenched, both operationally and economically. But it is not multi-platform, and a multi- platform solution is needed to support the variety of devices in your environment. Consider these four emerging—and economically sound—best practices: 1. Adopt an MDM platform that can also manage PCs and Macs as well as mobile devices. The lines between laptops, tablets, and smartphones will continue to blur in both user functionality and IT operations. A versatile MDM solution will cut down on infrastructure costs, improve operational efficiency, and create a single user view into devices and data for operations and security. 2. Be sure your reporting and inventory tool consolidates both your existing BlackBerry and your multi-platform MDM solutions. You’ll rely on your data and reports daily, and you’ll want to avoid any manual processes to access your business intelligence on mobile devices. 3. Take a look at cloud-based MDM services. When you account for full Total Cost of Ownership (TCO), a LAN-oriented management solution can be costly. Why use a more expensive—and wired— solution to manage remote mobile devices? 4. Go the agent route with caution. If you can meet your needs with server-side management controls, all the better. You’ll find this is the better solution for the long haul, given the proliferation of hardware/OS/carrier combinations. If you opt for an agent-based solution, you’ll spend lots of time installing and maintaining it across the mobile landscape. 8 Mobile Device Management: Your Guide to the Essentials and Beyond www.maas360.com
  • 11. 8. Spread the Word about Your Progress Report on and discuss your mobile device inventory and policy status— including personal devices—in your IT operations reviews. It’s a good way to broaden the discussion beyond those responsible for managing devices in your environment. It’s also an opportunity to raise the visibility of the benefits for your organization, as well as for future resource requirements such as needed involvement from those responsible for security and other areas of IT. Your inventory and reporting tool should make it simple to produce the reports to start conversations in these meetings. Designed for Any Environment The practices we’ve discussed so far should meet most organizations’ needs. In fact, they satisfy the most stringent security and privacy regulations, such as those dictated by the HIPAA, FINRA, and PCI DSS. These regulations only require, in practice, that organizations encrypt their data and are able to destroy data on a lost device. The essential practices cover that and more. Build Upon Your Foundation with Advanced Practices With the essentials in place, your organization is primed for an effective mobile IT operation in the near term. Now you need to determine whether or not your organization needs to go a step further with advanced practices. www.maas360.com Mobile Device Management: Your Guide to the Essentials and Beyond 9
  • 12. 9. Get a Grip on Usage Costs You need to be able to track, monitor, and restrict network usage. After all, the costs for international data roaming can reach thousands of dollars per trip. Even domestic usage can quickly add up, especially considering the pricing plans introduced by AT&T for iPhones and iPads in 2010. 10. Automate Compliance Management IT needs a way to automatically detect devices out of compliance with policy—and automatically respond. For example, your policy may specify that jailbroken or rooted devices are not allowed in the corporate environment and if one is detected, you will immediately revoke access to corporate systems. Ideally, the detection and revocation should happen automatically. At the same time, you want to automatically notify the user of the action being taken and what’s needed to come into compliance and regain access to corporate resources. Once the device is in compliance, access should be automatically reinstated. 10 Mobile Device Management: Your Guide to the Essentials and Beyond www.maas360.com
  • 13. 11. Manage Application Restrictions and Your Own Application Storefront Today, most smartphone and tablet vendors do a good job of limiting usage to certified and approved applications. Some would argue they do too good of a job restricting access. Other vendors maintain a very open policy for creating applications, with no formal process for certifying apps. That said, certain organizations or industries may need to restrict the type of application allowed on a corporate-approved device. If you want to be proactive about it, set up your own enterprise application storefront. This allows you to present a list of approved applications and ease their delivery to mobile devices. Plus, your users will know where to go for these applications and for updates. Some MDM- solution providers can even help you deliver documents such as PDFs to devices. 12. Provide a Backup & Recovery Service If any of your users work with critical and unique data beyond email, you may want to consider using a backup and recovery solution. Those using an iPhone or an iPad can rely on iTunes to take care of this. Just make sure your policies are set to force an encrypted backup. For those not using iTunes for backup, you’ll probably need to address specific use cases. www.maas360.com Mobile Device Management: Your Guide to the Essentials and Beyond 11
  • 14. Mobility Can’t Wait Mobile devices in the corporate environment are here to stay. Your organization can either drag its feet while renegade devices access corporate resources, or employ best practices that will satisfy end users and IT. Whether you need to cover the basics or need to step up mobile device management to a higher level, this guide will start you on your way. Interested in a free evaluation of a leading mobile device management solution? Click here to take advantage of a quick and easy trial. Or, check out these resources to learn more about mobile device management software from Fiberlink. • www.maas360.com • Mobile Device Management • MaaSters Center All brands and their products, featured or referred to within this document, are trademarks or registered trademarks of their respective holders and should be noted as such. 12 Mobile Device Management: Your Guide to the Essentials and Beyond www.maas360.com