+ All Categories
Home > Documents > Focus: Enterprise Mobility Management

Focus: Enterprise Mobility Management

Date post: 07-Feb-2022
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
29
E-guide Focus: Enterprise Mobility Management
Transcript
Page 1: Focus: Enterprise Mobility Management

E-guide

Focus: Enterprise Mobility

Management

Page 2: Focus: Enterprise Mobility Management

Page 1 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

In this e-guide:

If your business does not have some kind of strategy for

enterprise mobility management, then are you really running a

business at all? At the very least you’re sailing perilously close

to the wind when it comes to enterprise cybersecurity.

In this e-guide, we will explore exactly these topics, looking in-

depth at some of the key trends and developments in the world

of enterprise mobility, as well as keeping a watchful eye on

cybersecurity.

First, BrianMadden.com’s Jack Madden rounds up the

fundamentals of enterprise mobility management, and reveals

why it’s important for you to understand it.

Still not convinced you need to manage how your employees

use mobile technology in the workplace? Rene Millman looks at

the world of mobility management from the point of view of the

SME, and how to maximise the potential of mobile tech.

Page 3: Focus: Enterprise Mobility Management

Page 2 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Meanwhile, in the land Down Under, organisations are mindful

of the productivity and flexibility benefits of enterprise mobility,

yet remain determined to achieve systems governance to

protect themselves. Beverley Head examines the Australian

holistic approach to enterprise mobility.

Finally, security consultant Kevin Beaver offers up some tips

on enterprise mobile security, looking specifically at password

management best practice. Traditional approaches to

passwords are no longer valid, Beaver argues, and IT

departments need to find new ways to manage both users and

applications.

Alex Scroxton, networking editor

Page 4: Focus: Enterprise Mobility Management

Page 3 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

The top enterprise mobility management resources - February 2018 Edition

Jack Madden, guest contributor

This article is your guide to everything you need to know about enterprise

mobility management and related topics. If you’re new to EMM, you can learn

the basics. If you’re already familiar, bookmark this to find key resources. And if

you want to know our world-view on anything, we’ve got that, too.

This article gets updated every few months, most recently on February 20,

2018. For daily EMM news and opinions, head to the BrianMadden.com

homepage, our RSS feed, my Twitter account, or our Friday Notebook series.

Table of Contents

What is EMM and why should you care? Understanding mobile device and app management Identity management Mobile security and mobile threat defense Apple and iOS MDM resources Google and Android MDM resources Windows 10 MDM and Unified Endpoint Management IoT

Page 5: Focus: Enterprise Mobility Management

Page 4 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

What is EMM and why should you care?

In the past, I would point to articles like In the mobile/cloud era, it’s just how we

do things, this 5-part series on the state of EMM, or this article about

“workspace” management. But in 2018, I think it’s safe to say that everybody

“gets” EMM now. Of course, we’re always watching to see what’s next, like

wearable devices, machine learning, and voice assistants.

Understanding mobile device and app management

While everyone gets what EMM is and why we have it, there’s still a lot of

complexity to unravel. Here are a few places to start:

My three-part guide to mobile app management: Part 1: Why we need MAM, but why it’s challenging; Part 2: Different MAM techniques; Part 3: MAM applied to different use cases. (You can also see a video version via my Citrix Synergy 2016 session.)

Infographic: When to use MDM, MAM, and other EMM techniques. A visual guide to how Android enterprise, iOS MDM/DEP, Samsung Knox, and mobile threat defense apply to BYOD, COPE, embedded devices, and the extended enterprise.

Android enterprise has come a long way in the last few years, so see The state of Android enterprise in 2017 and Android BYOD should be easier in 2018 (and in 2019, and in 2020...)

iOS management has been strong for many years, though lately I think it’s missing out on some important features, as described in Apple’s iOS management protocol needs to get better for BYOD. Here’s why and what they could do.

Page 6: Focus: Enterprise Mobility Management

Page 5 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

For some recent thought on MDM, MAM, BYOD, and use cases, read:

What does the Microsoft Graph API for Intune mean for the rest of the EMM market?

Corporate devices are getting all the love these days, but BYOD challenges remain.

Do you let your BYOD users choose between MDM enrollment and MAM-only?

Are we too focused on typical office workers? The rise of the extended enterprise.

Mobile device management products aren’t a commodity, despite past predictions.

Identity management

If EMM applies to the mobile part of the “mobile/cloud era,” identity and access

management is one of the most important technologies for dealing with the

cloud part (at least from the end user perspective). See:

Why you need identity and access management as a service An introduction to identity Get ready for smarter identity and access management—It’s going to be

awesome! Cloud-based identity management services can work for your on-

premises apps, too

Page 7: Focus: Enterprise Mobility Management

Page 6 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Mobile security and mobile threat defense

Mobile devices have a completely different threat model than desktop operating

systems. See:

A look at the official iOS and Android security reports In 2017, Mobile Threat Defense is finding its groove - Part 1 - The

landscape; Part 2 - The technology; Part 3 - The market Apple’s iOS 11 security white paper (PDF) Android.com security overview Googles Android 2016 Security Year in Review (Blog post | complete

PDF) (The 2017 version should be coming soon.)

Apple and iOS MDM resources

Most of Apple’s official iOS and macOS MDM documentation is pretty easy to

find these days:

iOS Deployment Reference, macOS Deployment Reference, and Apple TV management overview

Apple device configuration profile key reference Over-the-air profile delivery and configuration Mobile device management protocol reference (This is newly-public, it

used to be vendor-only!) Device Enrollment Program, Volume Purchase Program, and Apple

School Manager Apple Configurator (Free in the Mac App Store.)

Page 8: Focus: Enterprise Mobility Management

Page 7 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Ground Control is a third-party product that’s useful for dealing with large numbers of DEP-enrolled and supervised devices.

iOS updates are usually announced in June and roll out in September with new

iPhone models, and for a few years now their have been significant spring

updates as well. Here’s the most recent information:

Apple WWDC 2017: Here are the enterprise management updates for iOS 11

Deep dive on iOS 11 in the enterprise - BrianMadden.com Podcast #131 with guests Aaron Freimark, CEO of Ground Control and founder of com, and Russ Mohr or MobileIron.

Apple announced iOS 11.3 in January 2018, and the updated Configuration Profile Reference revealed a new MDM restriction that allows IT to delay iOS updates on Supervised devices for up to 90 days. This is a big, long-requested feature, but note that Supervision is only intended for enterprise devices, so there’s still no way to prevent BYOD users from upgrading. Here are more details, via Russ Mohr.

Google and Android MDM resources

We all know the Android MDM story: Originally, Android didn’t have great MDM

capabilities, so OEMs like Samsung added their own. Then in 2014 and 2015,

Android for Work came along, and now it’s just called Android enterprise.

Things are really moving fast now, as it’s been required long enough that it

should be pretty much everywhere, and even Samsung Knox has been re-

architected to utilize Android enterprise features. Most recently, Google

Page 9: Focus: Enterprise Mobility Management

Page 8 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

announced the Android Enterprise Recommended device program. Here’s

where to find more information:

The Android enterprise homepage lists supporting vendors and devices. Google’s official Android enterprise blog Android enterprise help page Managed Google Play help page Google’s Developer side for Android EMM has a lot of information that’s

valuable for anyone that wants to learn more about it. Also see the Android EMM Developers site, this test device policy

controller app, and Device Administrator documentation; as well enterprise features by version: Android 5.0; Android 6.0; Android 7.0; and Android 8.0.

You can also check out Android enterprise guides (plus other guides and blog posts) from Jason Bayton.

Samsung Knox provides EMM features that can be used on top of (and

underneath) Android enterprise. See:

Our overview of Samsung Knox MDM. SamsungKnox.com homepage and blog. (Not update often, but

sometimes has posts about new versions of the Knox API.) Developer Guide for Knox 3.0/Android enterprise unification. Knox SDK and developer tools, support, feature list, and partner

program.

Page 10: Focus: Enterprise Mobility Management

Page 9 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Windows 10 MDM and Unified Endpoint Management

Windows 10 brought Modern Management and support for MDM, and now a

new trend (and confusing acronym): Unified Endpoint Management. Here are

some recent blog posts:

How Windows 10 co-management works with SCCM and Intune/MDM, and how third parties can use it, too

Put your Windows 10 deployments on AutoPilot

And here are shortcuts to Microsoft’s documentation:

Co-management information in the SCCM 1709 preview Overview of Windows 10 MDM All of the MDM APIs available for Windows 10 Newer MDM APIs in more recent versions of Windows 10 MDM Migration Analysis Tool

IoT

Gabe and I have written a couple recent articles on the Internet of Things:

IoT and IT/OT convergence. EMM-managed IoT versus 3-tier IoT. Brian Madden (yes, Brian!) popped back up in the industry recently and

gave a great session on IoT and how it relates to EUC at Igel Disrupt—here’s a video.

Page 11: Focus: Enterprise Mobility Management

Page 10 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

How to find the right mobility strategy for your SME

Rene Millman, guest contributor

When budgets are tight, as they are for most small and medium-sized

enterprises (SMEs), having a mobile strategy may seem an extravagance.

However, most businesses use a mobile device in one way or another, so

maximising their usefulness is a must.

According to the Office of National Statistics, (ONS) the amount of people

regularly working from home has risen to 4.2 million in the last decade and it’s

expected that half of the UK’s workforce will be working remotely by 2020.

Furthermore, the latest figures from the Department for Business, Innovation &

Skills (BEIS) say that 16.1 million people work for SMEs – 60% of all private

sector employment in the UK.

According to Myles Leach, managing director at voice-over-IP (VoIP) firm Nfon

UK, it stands to reason that SMEs are and will continue to be affected by this

change in working trends: “Employees need and want to have the opportunity to

work flexibly. But crucially it benefits the SME. It saves on office space and

costs,” he says.

Page 12: Focus: Enterprise Mobility Management

Page 11 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

“Operations can continue when a site is shut because of bad weather or for

maintenance. There will invariably be fewer staff ‘sick days’ as they can still

work during school holidays and when children are ill.”

Bringing mobile into SMEs and bring things up to date

What works for one SME won’t necessarily work for another, but before

adopting a mobility strategy it’s important to look at what’s already in place, to

determine where changes need to be made. According to Andres Richter, CEO

at cloud ERP specialist Priority Software, in a survey his firm carried out of 500

UK senior decision-makers, over a third did not have the correct technology to

support mobile working, and 43% couldn’t perform business-critical functions on

a mobile application.

“If the company already has business software applications in place, they

should see if their vendors already offer mobility tools. For example, many

modern ERP systems now support mobile application generators which allow

users to create a range of applications from their mobiles and use them to

perform core business processes no matter where they are. These can be

created in a matter of minutes, and don’t require high levels of IT expertise,

perfect for SMEs looking to enhance their mobility strategy using existing

technology,” he says.

Jon Wrennall, chief technology officer at cloud software supplier Advanced,

says that SMEs should look to place employees at the heart of their mobile

Page 13: Focus: Enterprise Mobility Management

Page 12 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

strategy, “empowering them to use mobile technology to streamline their tasks

and minimising the chances of departments working in siloes”.

He adds that SMEs can use the cloud to help facilitate mobile working, which

enables users to work on the move and still have all the real-time information

they need at their fingertips.

“The cloud is a key driver in making mobile strategies success but implementing

such a strategy is often seen as a bold move as some SMEs lack confidence in

adoption and don’t understand the positive role it can play,” says Wrennall.

“SMEs should therefore look to take incremental steps. For example, they can

trial mobile technology will a select set of employees who can then share

feedback with those that aren’t yet familiar with it. It also enables SMEs to

assess areas for improvement,” he says.

Device and service choice

Wrennall said that when it comes to devices and service choice, not everyone is

familiar with mobile devices. Some will be more receptive to changing their

working practices, while others might not.

“SMEs should give more support to those that need it and educate them on the

benefits of mobile and the cloud. They should work closely with staff to find out

their pain points, as this will determine what devices and services they choose

to implement,” he says.

Page 14: Focus: Enterprise Mobility Management

Page 13 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

He adds that a move to a mobile strategy should be considered with the same

level of due diligence as any other significant investment within a business.

Before choosing what device or service to adopt, SMEs must consider how a

transition will impact their staff and customers as well as choose a provider that

can illustrate a clear and structured pathway for moving staff and data to mobile

technology as smoothly as possible.

“Device and service providers must be able to show they are going to be a long-

term value adding partner and that they’re in it for the long haul,” says Wrennall.

Organisations would be well advised to use just one type of device or at least

minimise the number of unique hardware/software configurations,” according to

Jack Zubarev, president at Parallels, a supplier of desktop and application

virtualisation software.

“The cost of delivering and supporting applications simply increases with each

unique device/software combination. Further device replacement and refresh

will become far less expensive if one can standardise not just on device vendors

but on the specific configuration(s),” he says.

“But then again, most organisations do not have the luxury of this

standardisation as employees bring their own devices. In this case universal

remote delivery of applications to any device, will likely provide the most cost-

effective solution and isolate software delivery from underlying device

hardware.

Page 15: Focus: Enterprise Mobility Management

Page 14 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Making mobility secure

SMEs are in as much danger from cyber criminals as larger enterprises. David

Emm, principal security researcher at Kaspersky Lab, says that if SMEs

overlook mobile security, they run the risk of leaving a big gap in their security

defences. He adds that his firm detected 5,730,916 malicious installation

packages, 94,368 mobile banking Trojans and 544,107 mobile ransomware

Trojans in 2017.

“One of the dangers is that mobile technology ‘creeps’ into the business and

isn’t necessarily considered in the same way as desktop or laptop

security. Consider the BYOD [bring-your-own-device] trend, for example, where

staff use their own devices for business,” he says.

“This isn’t a bad thing per se, but it’s important that businesses include mobile in

their risk assessment, just as they would for any other technology they use: i.e.

looking at what assets they have, how are they used, how is data stored/moved,

who has access to it, who might want it and how might they try to access it

etc. In this sense, mobile security should be considered as part of an overall

security strategy.”

One of the biggest trends affecting mobile strategy and security is BYOD. “No

longer can organisations insist on a device to be used by employees,” says

Clive Longbottom, service director at Quocirca. “This is made worse by the

changes in workforce – contractors, consultants, specialists and so on cannot

Page 16: Focus: Enterprise Mobility Management

Page 15 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

be forced to use a specific device, but can be forced to allow the organisation to

create a secure partition on their device.”

Employees at smaller companies may not realise that, when downloading an

app, where that app came from.

“Employees can search on an App Store and find any number of apps that

purport to be able to do what they want. Individuals tend not to even check to

see where the developer comes from (for example, Russia or China) and will

have no capabilities to check the traffic between their device and the backend

servers,” says Longbottom.

“By creating a secure partition, users can be prevented from loading apps on to

it, with only the company-approved apps being available to them. Sure, the

individual can still install apps on their part of the device, but these apps will not

have access to any corporate data.”

Putting best practice into your mobile strategy

Priority’s Richter says the best tip is to understand where in the business a

mobility strategy will add value. “Is it more important for your HR and accounting

team to be mobile, or your field service reps? Although the end goal should be

full mobility across the board, initially, instead of trying to do everything at once,

being selective about what parts of the business would benefit from going

mobile will increase the chances of a strategy sticking,” he says.

Page 17: Focus: Enterprise Mobility Management

Page 16 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Leach says that line managers must be confident that staff are aware how to

use, and are using, technologies available so that employees are just effective

at their job when out of the office.

“There also need to be clear policies for working from home, such as allocated

days and shared calendars. However, the most crucial factor to ensure a

successful mobile strategy is creating a positive culture for mobile working. Do

employees feel comfortable asking for and then working from home? Do

you trust that they will be working, or do you think that they will be swilling tea all

day whilst signing for neighbours’ Amazon deliveries?” he says.

Should SMEs worry about 5G? What does the future hold for SME mobile

strategies?

At some point in the next few years, 5G networks will begin to be

commercialised. 5G devices should be expected to consume less energy and

thus improve battery life. 5G networks will have higher data rates and lower

latency than previous mobile generations.

These new networks will come with features to give companies better mobility

and flexibility. This will be useful for SMEs with remote employees being able to

work anywhere and retain workplace-like bandwidth and connectivity.

The internet experience of 5G for field employees will be better in a number of

ways. Internet-connected vehicles and machinery can be more easily monitored

Page 18: Focus: Enterprise Mobility Management

Page 17 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

in real-time. It should also be easier to get analytical data into management

hands to enable quicker decisions wherever employees are. These should

make an impact on a business’s productivity.

Page 19: Focus: Enterprise Mobility Management

Page 18 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Australia's holistic approach to enterprise mobility

Beverley Head, guest contributor

A sea change is underway in how organisations tackle enterprise mobility in

Australia. While mindful of the productivity and flexibility benefits of enterprise

mobility, Australian organisations are still determined to achieve systems

governance to ensure security and preserve privacy.

This has prompted a more holistic approach to enterprise mobility management,

often resulting in companies selecting service-based rather than point products.

According to research firm IDC, Australia is one of the most progressive

markets for enterprise mobility in Asia-Pacific and Japan, with organisations

having shifted “from a defensive posture to a proactive approach regarding their

employees’ use of mobile technologies”.

Heralding that shift was the Australian Bureau of Statistics, which had sent out

33,000 officers to run the most recent census using a mobile app running on

their own mobile devices rather than rely on paper forms. The app was

deployed and secured by MobileIron, an enterprise mobility software supplier.

Page 20: Focus: Enterprise Mobility Management

Page 19 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Sabharinath Bala, senior research manager at technology research company

IDC, says until recently, the focus with enterprise mobility management had

been on device security, so if a smartphone was lost or stolen, its content could

be wiped, and the device locked.

However, enterprises today are now adopting all-encompassing methods to

secure all content and applications accessed beyond the walls of their

organisations. “That is the prime concern for larger enterprises and large mid-

sized companies,” he says.

Bala noted that industry players like MobileIron, VMware and Microsoft had

already acknowledged that protecting content was far more important than just

securing devices. That content also includes data transmitted over

communications networks, including unsecured wireless hotspots.

Exponential growth in adoption

Michelle Bendschneider, executive director for Telstra Global Products, says

there is currently evidence of “exponential growth in adoption of enterprise

mobility solutions”.

“Five years ago, it was very softly controlled adoption,” she says, adding that

with disruptive technologies such as cloud-based apps and services, companies

of all sizes – from small businesses to large government departments – are now

exploring new ways of working.

Page 21: Focus: Enterprise Mobility Management

Page 20 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

However, enterprise mobility is more than just putting mobile apps into the

hands of workers. A range of technologies to support mobile users is necessary

to realise the full potential of enterprise mobility – especially given the

experience gulf between enterprise and consumer apps.

Forrester Research, another technology research firm, recommends a more

comprehensive approach that involves the use of mobile management software

from the likes of AirWatch, Citrix and MobileIron, in concert with team

messaging platforms such as Microsoft Teams or Slack.

It also advises organisations to adopt “progressive” web apps, which are

essentially websites disguised as applications, and enhanced push notifications

to spur employees into action.

Adopting enterprise mobility

In Australia, the most enthusiastic adopters of enterprise mobility are

organisations in financial services, local and state governments, and law

enforcement agencies, according to IDC’s Bala.

The Queensland Police Service, for example, has equipped 3,000 frontline

officers with tablet computers, allowing them to access information wherever

and whenever they want.

“In split seconds, they can know who they are talking to, and whether that

person has alerts against them,” says Queensland’s police commissioner Ian

Page 22: Focus: Enterprise Mobility Management

Page 21 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Stewart. “We have seen a huge increase in the number of checks done per

shift.”

The police claim the mobility project, which was rolled out through a managed

mobility service contract with Telstra, has saved 30 minutes per shift per officer

– time which can be redirected to more proactive activities than administration.

Bendschneider says the time savings mean officers can perform 100 checks per

shift, while “previously they might have done five”.

Meanwhile, Motorola Solutions has signed a A$50m deal with Victoria Police to

roll out a similar managed mobility service for 10,000 officers. Mobile devices,

apps, round-the-clock service, device management and monitoring will be

provided as part of the deal.

“Frontline officers will gain access to data when and where they need it most,

helping them to manage their essential daily tasks with increased efficiency and

safety,” says Motorola Solutions vice-president and managing director Steve

Crutchfield.

“For example, it can alert officers about potentially dangerous suspects.

Eventually, the application will free up officers’ time, enabling them to complete

administrative tasks in the field instead of back at the station.”

Page 23: Focus: Enterprise Mobility Management

Page 22 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

In a separate sector, Telstra has delivered a managed mobile solution to the

NSW Department of Family and Community services, replacing a manual and

largely paper-based process of applying for community housing.

“It’s taken a 45-page application to a single online 15-minute process,” says

Bendschneider, adding that security was also a key focus given the confidential

nature of the information captured in that process.

The IoT dimension

The expected growth in adoption of enterprise-grade internet of things (IoT)

networks and devices will add an extra dimension for enterprise mobility

solutions, by demanding a more unified device management approach that

manages sensors and smartphones alike through a single platform.

Indeed, Forrester forecasts that leading enterprise mobility management

suppliers will extend their offerings with unified device management solutions,

IoT management and analytics services that offer insights based on data

collected from IoT devices.

“IoT was just a buzzword until a year back,” says IDC’s Bala. “It’s now being

deployed to take advantage of the quantum of data,” he says, noting that

Blackberry, MobileIron and VMware are all working in this area. He also predicts

greater demand for unified device management within 18 months,

predominantly from large enterprises.

Page 24: Focus: Enterprise Mobility Management

Page 23 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Meanwhile, Telstra is seeing opportunities in the small and medium-sized

enterprise (SME) space. In 2018, the telco will deliver a new managed mobility

service for SMEs that includes devices, apps, network carriage and mobile

management services.

Bendschneider says the idea is for SMEs to open the box with the devices,

connect them to the network and be automatically connected to the apps and

mobile management service. The service is currently being tested as a

minimum viable product (MVP) by some organisations.

“Our philosophy is to take the sting out of the tail. There’s no need to source for

the device, set up the software or manage the logistics,” says Bendschneider.

“Instead, Telstra’s service will handle that side of the house, leaving the

business to unlock the potential productivity of mobile workers.”

Page 25: Focus: Enterprise Mobility Management

Page 24 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

How to approach mobile password management for the enterprise

Kevin Beaver, guest contributor

As new mobile security threats continue to emerge, traditional approaches to

password management for the enterprise aren't as effective as they once were -

- and IT pros must find new ways to properly manage mobile users and apps.

Previous methods of password management for the enterprise included relying

on standard passwords and encouraging users to choose which apps to install

and use. As these older methods fail, some IT and security managers claim that

mobile access management is out of their control. Others attempt -- and fail -- to

enforce Windows domain password policies and user provisioning processes

across mobile devices.

When mobile security risks exist, they can compromise critical apps, their

associated content and larger business systems. And as mobile expands into

the internet of things, proper identity and password management at the

enterprise level are as important as ever.

Page 26: Focus: Enterprise Mobility Management

Page 25 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

BYOD and beyond

A BYOD policy and periodic user training are no longer sufficient for password

management for enterprises. Instead, IT pros must integrate automation and

simplicity into the process. Most organizations require a level of visibility and

control over mobile apps and content that mobile device management (MDM)

and enterprise mobility management (EMM) can't provide.

MDM and EMM have evolved into unified endpoint management, which uses

aspects of modern data analytics and artificial intelligence combined with

traditional identity management approaches. IT pros can more easily onboard

and manage users and the apps they need, protecting access to business

assets over the entire user account lifecycle.

A BYOD policy and periodic user training are no longer sufficient for password

management for enterprises.

For more granular control, find a more holistic approach to password

management for the enterprise. Some ways to do this are to:

implement identity federation and single sign-on across common business apps;

use multifactor authentication to further enhance security on mobile devices;

automate user enrollment and account management;

Page 27: Focus: Enterprise Mobility Management

Page 26 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

deploy enterprise mobile app management, including custom catalogs, automation and access enforcement, to enterprise resources from trusted apps and devices without user intervention;

integrate threat management and analyze apps to minimize exposures; and

use big data analytics to provide insight into past and potential security events.

Emphasize process and progress

To get started with mobile identity and password management for the

enterprise, IT pros must fully understand their requirements. IT pros should set

goals for their enterprise mobility deployment, such as a positive user

experience, simplified management and improved security.

Security should be a key part of every enterprise mobile strategy. Screen

protection, encryption and remote wipe are three technologies that can improve

mobile device security.

To measure progress on an ongoing basis, it's important to examine the

workflow. First, analyze current mobile password and app-related risks,

determine which gaps exist between the traditional network and mobile network,

and discuss mobile needs with the proper users and department heads.

Measure those risks over time to see how they both evolve and resolve. IT pros

should look at repeat findings, as well as how long it takes to address each of

their identified risks.

Page 28: Focus: Enterprise Mobility Management

Page 27 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Finally, monitor for tangible policy violations, device loss and data loss to

improve processes, and understand how to adjust mobile password

management for the enterprise. Products such as AirWatch by VMware,

MaaS360 from IBM, Mobile Device Manager Plus from ManageEngine and

Enterprise Mobility + Security by Microsoft can help to simplify these processes.

In the long term, IT pros should look beyond mere compliance for their mobile

environments. Instead, strive for true security that integrates with the overall

enterprise security program -- both locally and out to the cloud.

Page 29: Focus: Enterprise Mobility Management

Page 28 of 28

In this e-guide

The top enterprise mobility

management resources –

February 2018 Edition

How to find the right mobility

strategy for your SME

Australia’s holistic approach

to enterprise mobility

How to approach mobile

password management for

the enterprise

Focus: Enterprise Mobility Management

Getting more CW+ exclusive content

As a CW+ member, you have access to TechTarget’s entire portfolio of 140+

websites. CW+ access directs you to previously unavailable “platinum members-

only resources” that are guaranteed to save you the time and effort of having to

track such premium content down on your own, ultimately helping you to solve

your toughest IT challenges more effectively—and faster—than ever before.

Take full advantage of your membership by visiting www.computerweekly.com/eproducts

Images; stock.adobe.com

© 2018 TechTarget. No part of this publication may be transmitted or reproduced in any form or by any means without

written permission from the publisher.


Recommended