dummies guide mobility 2010

Upload: jargan

Post on 05-Apr-2018

235 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Dummies Guide Mobility 2010

    1/48

    WiththecomplimentsofSybase

    SybaseLimitedEdition Securely manage

    your data, devices

    and applications

    FREE eTips at dummies.com

    Mobility

    Management

  • 8/2/2019 Dummies Guide Mobility 2010

    2/48

  • 8/2/2019 Dummies Guide Mobility 2010

    3/48

    by Mike Oliver, Sybase

    A John Wiley and Sons, Ltd, Publication

    MobilityManagementFOR

    DUMmIES

  • 8/2/2019 Dummies Guide Mobility 2010

    4/48

    Mobility Management For Dummies

    Published byJohn Wiley & Sons, LtdThe AtriumSouthern GateChichesterWest Sussex

    PO19 8SQEngland

    Email (for orders and customer service enquires): [email protected]

    Visit our Home Page on www.wiley.com

    Copyright 2010 by John Wiley & Sons Ltd, Chichester, West Sussex, England

    All Rights Reserved. No part of this publication may be reproduced, stored in a retrievalsystem or transmitted in any form or by any means, electronic, mechanical, photocopying,recording, scanning or otherwise, except under the terms of the Copyright, Designs andPatents Act 1988 or under the terms of a license issued by the Copyright Licensing Agency

    Ltd, 90 Tottenham Court Road, London, W1T 4LP, UK, without the permission in writing ofthe Publisher. Requests to the Publisher for permission should be addressed to thePermissions Department, John Wiley & Sons, Ltd, The Atrium, Southern Gate, Chichester,West Sussex, PO19 8SQ, England, or emailed to [email protected], or faxed to (44)1243 770620.

    Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, AReference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way,Dummies.com and related trade dress are trademarks or registered trademarks of JohnWiley & Sons, Inc. and/or its affiliates in the United States and other countries, and maynot be used without written permission. All other trademarks are the property of theirrespective owners. Wiley Publishing, Inc., is not associated with any product or vendor

    mentioned in this book. Sybase, iAnywhere, and Afaria are trademarks of Sybase, Inc or itssubsidiaries. indicates registration in the United States of America. All other companyand product names mentioned may be trademarks of the respective companies with whichthey are associated.

    LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER, THE AUTHOR, AND

    ANYONE ELSE INVOLVED IN PREPARING THIS WORK MAKE NO REPRESENTATIONS OR

    WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF

    THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT

    LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE

    CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND

    STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK

    IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERINGLEGAL,ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS

    REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT.

    NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING

    HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK

    AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN

    THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION

    OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS

    SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED

    OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

    Wiley also publishes its books in a variety of electronic formats. Some content thatappears in print may not be available in electronic books.

    ISBN: 978-0-470-66620-3

    Printed and bound in Great Britain by Page Bros, Norwich

    10 9 8 7 6 5 4 3 2 1

  • 8/2/2019 Dummies Guide Mobility 2010

    5/48

    Contents

    Introduction ............................................1About This Book ............................................................1

    Foolish Assumptions .....................................................2

    How to Use This Book ...................................................2

    Icons Used in This Book ................................................3

    Where to Go from Here .................................................3

    Part I: Mobility Management:Why Bother? ...........................................5

    Considering the Challenges of Mobility ......................6

    Considering Why EnterprisesNeed Mobility Management .....................................10

    Introducing Afaria, from Sybase ................................11

    Part II: Managing Your Mobile Deviceswithout Sweat or Tears ...........................13

    Defining the Elements of a GreatManagement Solution ...............................................14

    Finding the Solution with Afaria, from Sybase .........21

    Part III: Under Lock and Key:Enforcing Security .................................23

    Security: Considering Your Requirements ...............24

    Stating the Requirements ofYour Security Solution..............................................25

    The Security Checklist ................................................28

  • 8/2/2019 Dummies Guide Mobility 2010

    6/48

    iv

    Part IV: Looking to the Future ................33

    Integrating Mobile Deployment Components ..........33Keeping Up with a Changing World ...........................34

    Avoiding Viruses Like the Plague ..............................36

    Part V: (More than) Ten TopMobility Management Tips .....................37

  • 8/2/2019 Dummies Guide Mobility 2010

    7/48

    Introduction

    Welcome toMobility Management For Dummies,your guide to managing and securing mobiledevices such aslaptops and smartphones.

    About This BookEvery day, more and more of your enterprise operatesoutside of the four walls of business where you interactdirectly with your customers and wherever youremployees are. This presents a key opportunity foryour business to gain a competitive advantage by

    having the information and applications necessary totake decisive action when you need to. Mobile technol-ogy is used in situations such as:

    An information worker using their personal deviceto access enterprise email and applications whenoutside the office.

    A salesperson getting a customer to sign for sam-ples received using a handheld device.

    A police officer with a laptop in her vehicle, ableto access a database of criminal information whileon patrol.

    A field service engineer referring to a laptop thatprovides information on specific parts needed so

    that he can fix the customers problem the firsttime.

  • 8/2/2019 Dummies Guide Mobility 2010

    8/48

    A retail salesperson in a store checking stocklevels and processing transactions with a hand-

    held point-of-sale device. A health worker having up-to-date patient infor-

    mation whether beside the bed in hospital orvisiting the patient at home.

    This book gives you the lowdown on enterprise mobil-ity management and how Afaria, the market leading

    solution, can help you.

    Foolish AssumptionsIn writing this book, weve made some assumptionsabout you. We assume that:

    Youre in business and enjoy the benefits of being

    able to stay connected and informed while youreon the move.

    Youre an IT manager who needs to keep on top ofthe multiple devices being used by employees.

    How to Use This BookMobility Management For Dummies is divided into fiveconcise and information-packed parts:

    Part I: Mobility Management: Why Bother? Weexplore the reasons to go mobile, the challengesyoull face, and the need for effectivemanagement.

    Part II: Managing Your Mobile Devices withoutSweat or Tears. We introduce Sybase solutions.

    2

  • 8/2/2019 Dummies Guide Mobility 2010

    9/48

  • 8/2/2019 Dummies Guide Mobility 2010

    10/48

    4

  • 8/2/2019 Dummies Guide Mobility 2010

    11/48

    Part I

    Mobility Management:Why Bother?

    In This Part Considering security, visibility, and control

    Addressing the challenges of mobility management

    Did you know that up to 70 per cent of enterprisedata exists in various mobile settings, from lap-tops to smartphones, to retail and remote office envi-ronments? Thats quite a statistic!

    Your mobile staff might be employed for a variety ofskills to treat patients, dig up roads, repair malfunc-

    tioning equipment, or sell a product. Theyre rarely ITsavvy and certainly not security experts. Yet more than75 per cent of enterprises leave responsibility for secu-rity in the hands of the user literally.

    This part explores the challenges that mobility bringsand why you need management and security toaddress these challenges.

  • 8/2/2019 Dummies Guide Mobility 2010

    12/48

    Considering the Challenges

    of MobilityMobility brings numerous opportunities but alsochallenges. Table 1-1 compares the advantages of net-worked computers with the challenges of mobiledevices that you need to overcome.

    Table 1-1 Comparing Networked Computerswith Mobile Devices

    Networked Computers Mobile Devices

    Unlimited bandwidth Bandwidth is limited

    Guaranteed, reliableconnectivity

    Intermittent, unreliableconnectivity

    Local support for users No local technical support

    IT can easily get to systems IT may never see devices

    The same platforms used A variety of devices andplatforms

    Physical building security Easily lost or stolen

    The following sections consider other challenges youneed to overcome when employing mobile devices.

    SecurityDevice management and security are totally interde-

    pendent. An unsupported, unmanaged secure systemis invariably vulnerable the moment it is untethered!

    6

  • 8/2/2019 Dummies Guide Mobility 2010

    13/48

    7

    Mobile security is the need to control user access andprotect your data on the device, in transit, and if lost or

    stolen.Without the appropriate security, mobile devices areextremely vulnerable to security gaps. As a result, therisk of intrusion is high and security controls are incon-sistent at best and often unenforceable. Whether itshackers, viruses, corrupted data, or lost or stolendevices, theres plenty to be concerned about.

    Additionally, regulations regarding data privacy andencryption are becoming stricter and can result in finesfor noncompliance. IT and security experts mustmanage and protect sensitive information and enforcecompliance centrally, rather than leaving the burden ofsecurity to the mobile device end-user.

    Security will always be an issue and the riskis even greater on mobile devices.

    User adoptionWe all do whatever makes it easier for us to do ourjobs. Your mobile workers are no different. Over theyears, your office-based systems will have been honed

    by adopting best practices. Youll face a challenge inasking your staff to abandon what they know and arecomfortable with.

    Introducing new systems for mobile workers alwayscarries a risk that unless they see the benefits for them-selves and buy in to the systems, users will revert totheir previous ways of working.

    You need to ensure that applications are intuitive andeasy to use. Ensure the devices wont fail just whenyour workers need them most.

  • 8/2/2019 Dummies Guide Mobility 2010

    14/48

    8

    Engage your mobile workers early, train andlisten to them, and theyll be successful!

    Central visibility for ITCentral IT needs to see activity levels and user method-ology in order to anticipate issues and continuouslyimprove the system.

    Being able to see whats actually going on at the front-lines is critical to success. Your IT folk need to knowwhat activities are happening, and why, in order tomake better decisions.

    If your workers arent utilizing the systems youvedeployed in the way you expected, you need to knowwhy.

    ControlRather than trying to accommodate disparate systemsand processes, you need centralized control.

    You want to have mobile deployments linked for effec-tive data sharing so your workers have the informationthey need, when they need it, and so that the informa-tion they gather is automatically processed to every-

    one who requires it.Each disparate system brings its own challenges. Youmight have a variety of devices with different userneeds, connecting over significantly varying band-width, and theyre often beyond direct, onsite ITsupport.

  • 8/2/2019 Dummies Guide Mobility 2010

    15/48

    9

    Having a management solution that gives youcontrol over multiple devices and platforms,multiple user groups, and multiple processesis critical.

    Business processes need to be consistently applied,and as requirements change executive leadership

    needs to be able to consistently drive changes to pro-cesses, actions, and behaviors.

    Food for thoughtIf youre not convinced about the benefits of mobility man-agement, here are some stats to chew over:

    Industry analysts rate mobile workforce enablementand security among the top enterprise IT priorities.

    In a six month period, passengers are estimated to leavebehind over 30,000 mobile phones in New York Cityyellow cabs. In the UK, around 8,500 mobile devicesincluding laptops, iPods and mobile phones are leftbehind in UK airports every year.

    Effectively mobilizing existing paper-based systemsalmost always delivers significant business benefits.Numerous organizations have achieved improved con-

    version of prospects into active customers by as muchas 15 per cent.

    Effective device management can also bring communi-cation costs under control, sometimes delivering asmuch as 60 per cent savings.

  • 8/2/2019 Dummies Guide Mobility 2010

    16/48

    10

    Considering Why Enterprises

    Need Mobility ManagementYou may have already started venturing down themobile road and have deployed devices and an applica-tion for a team within your organization. However,without effective management, device reliability varies,applications arent supported as well as those in the

    office, communication costs fluctuate, and securitythreats are significantly increased.

    Effective mobile device management gives you securecontrol over your mobile data, devices, and applica-tions, while giving your frontline workers the freedomto perform the job they were hired for, not strugglewith technology.

    Mobile workers are imperative to an organiza-tions success, and their device usage variesbroadly. For example, information workers(that is, people who work both at a desk andoutside of the office) need to be able to usetheir devices to send email, open PDFs andschedule meetings on the go. By contrast, task

    workers need access to the most up-to-datecustomer information, and require fastapproval to go ahead with business processessuch as work orders. To add to this complexity,the number of devices that support these work-ers are proliferating throughout corporations.

    With a mobile workforce comes the widespread distribu-tion of sensitive, proprietary, and sometimes downrighttop-secret data outside the secure walls of headquar-ters. Its critical for the success of a mobile deployment

  • 8/2/2019 Dummies Guide Mobility 2010

    17/48

    11

    to put measures in place to control and protect mobileassets. By implementing a solution that proactively man-

    ages and secures mobile data, devices, and applications,mobile projects can improve efficiency, customer ser-vice, and ultimately profitability. The need for mobilemanagement is growing fast!

    Introducing Afaria, from SybaseAfaria is a powerful and flexible solution to managemobility across the entire enterprise. Afaria simplifiesthe complexity of managing mobility by providing infra-structure that enables enterprises to take full advan-tage of the vast benefits of mobility today and into thefuture.

    Afaria gives IT the broadest cross-platform control and

    gives mobile workers the freedom to do their jobsrather than battle with baffling technology.

    Afaria supports mobile workers, wherever they are, by:

    Maximizing customer-facing time by minimizingconnection time, and delivering the right informa-tion at the right time, on a dependable device.

    Supporting the mobile workers devices and appli-cations as if they were in the office.

    Afaria supports enterprise IT by:

    Delivering control over all mobile devices, data,and applications from a single console.

    Keeping the security responsibility away from

    your end-users and within IT control.

    Automating business processes.

  • 8/2/2019 Dummies Guide Mobility 2010

    18/48

    12

    Whether your workers are using personally-owned con-sumer devices or task-specific ruggedized devices,

    Afaria enables you to manage mobility with completeconfidence. Sybase has the market-leading productsthat deliver the functionality enterprises demand.Afaria has been the acknowledged market-leadingmobile device management solution ever since themarkets been measured! And, as Afaria is part ofSybases mobility platform, you can easily add on

    email, or extend other applications as your mobilityneeds grow. In Parts II and III we look at how Afariasecurely manages devices, data, and applications.

  • 8/2/2019 Dummies Guide Mobility 2010

    19/48

    Part II

    Managing YourMobile Devices without

    Sweat or Tears

    In This Part Thinking about what makes a great mobile device

    management solution

    Seeing how Afaria fits the bill

    Maintaining the reliability and security of data anddevices outside the office can be very challenging.These environments are diverse, complex, and often

    beyond direct, onsite IT control. IT must be able to proac-tively manage all the devices, applications, data, and com-munications critical to the success of mobile workers.

    Organizations need to take a centralized approach tomanagement and security, providing IT with the con-trol and visibility they need, while empowering mobileworkers to be successful with the information andapplications they need to do their jobs.

    This part explains exactly what to look for in a mobiledevice management solution.

  • 8/2/2019 Dummies Guide Mobility 2010

    20/48

    Defining the Elements of a

    Great Management SolutionIts time to think carefully about the components of areally effective management solution. This sectionexplores the elements you need.

    Naturally, you need mobile data and device security,but this subject is so important that Part III is dedi-

    cated to it.

    Cross-platform device supportA good mobile device management solution supports awide variety of client types such as Symbian,BlackBerry, iPhone, Windows Mobile, Palm, WindowsXP, and OMA-DM devices from a single web-based

    console. Your initial deployment may be for a team offield engineers all using the same laptops, but you alsoneed to plan for deployment of information workerswho want to use iPhones, executives with BlackBerrysmartphones, or the sales teams laptops. Plan now forevery platform you have in your enterprise today andexpect that your needs will change in the future!

    Configuration managementCentral control of mobile devices enables administra-tors to maintain a wide range of software and hardwaresettings including device identification, network set-tings, connection profiles, regional settings, and alerts.The settings are continually checked against centrally

    defined configurations and reset whenever necessary.

    14

  • 8/2/2019 Dummies Guide Mobility 2010

    21/48

    15

    Device monitoringEffective mobile device management enables the userto work offline, instead of being constantly reliant ona connection to headquarters. A high-quality devicemanagement solution reacts to changes in the state ofa device monitoring memory, files, folders, and reg-istry settings for changes and can trigger processessuch as backing up a device when the battery leveldrops or launching a particular application when auser signs on.

    Monitoring also tracks application installationand usage policies through logging and report-ing capabilities and can track when confiden-

    tial files on mobile devices are written toexternal cards or sent to other devices.

    Protecting the insurersA market-leading insurance provider needed to protect sen-sitive customer financial and medical information residing onthe computers owned by 3,500 independent agents. Sybaseslaptop hard disk encryption, software distribution, devicemanagement, and stolen device lockdown dramaticallyimproved the ability to implement, monitor, and enforce strin-gent data security policies. The companys reputation as anindustry leader in information security was enhanced andcustomer service improved by having the most up-to-dateinformation on agents laptops.

  • 8/2/2019 Dummies Guide Mobility 2010

    22/48

    16

    License control

    A valuable component of a mobile device managementsolution is tracking how software licenses are deployedand used. Automatically generated reports includeinformation about the last time an application wasaccessed.

    Software distribution

    Applications can be electronically distributed,installed, and maintained and all without the end-users knowledge or involvement. Central administra-tion controls software installations, including versionmanagement, rollback, and criteria checking.

    Application control

    Application use can be controlled by either creating awhitelist of allowable installed applications, preventingapplications not on the whitelist to be blocked, orblacklisting certain ROM-based applications, such asSolitaire or Internet Explorer, to limit access.

    Inventory and asset control

    Administrators can perform comprehensive inventoryscans of hardware and software, and automaticallyreceive alerts of changes. A prime example is help deskpersonnel quickly capturing the state of a device tohasten the fixing of any problems.

    Remote control

    Laptop or handheld devices are remotely controlled todiagnose and correct faults, enabling mobile workersto focus on their jobs, not their IT systems.

  • 8/2/2019 Dummies Guide Mobility 2010

    23/48

    17

    Connection management

    A strong solution uses an intelligent architecturedesign that optimizes the ability to make the appropri-ate decisions about which tools to use when managinga mobile deployment. Additionally, connection manage-ment functions are fully deployable over-the-air, elimi-nating the need for remote devices to be manuallyconfigured by IT.

    Scheduling and prioritizationComprehensive scheduling enables work to be com-pleted at the most efficient times, and prioritization ofdifferent tasks ensures quick completion of the mostimportant activities. System administrators controlthe content, timing, parameters, and method ofcommunication.

    Getting the medical database fit and wellA leading medical database management organizationneeded a solution to better manage data retransmitted bybusiness services. With Sybase technology, its staff canupdate software and remotely diagnose laptop computersout in the field, eliminating the time-consuming method ofphysically shipping computers back to headquarters to beupdated or repaired. This significantly reduces time spent onback-office tasks and improves productivity.

  • 8/2/2019 Dummies Guide Mobility 2010

    24/48

    18

    Bandwidth optimizationComprehensive bandwidth management supportsapplications across all network types. On-the-fly datacompression, restarting connections at the point ofinterruption, file segmentation, and file-level and byte-level differencing minimize data volume for both largeand small transfers.

    Dynamic Bandwidth Throttling releases bandwidth toother applications when activity levels increase andthen reclaims it when they grow idle. Combining theability to dynamically react to throughput conditions,dynamically change throttling schemes, and dynami-

    cally configure and monitor these schemes providesyou with a powerful means to reduce costs and mini-mize your end-user pain. Clever stuff.

    Protecting corporate securityWith more than 25,000 mobile workers, a leading global finan-cial services company wanted to enforce corporate securityand perform inventory control on thousands of newlydeployed handheld devices. It turned to Sybase to secureinformation when devices are lost or stolen, provide proac-tive technical support by contacting users with solutions topotential problems, and increase productivity becauseemployees are always connected. A spokesperson said:Even when a device was out of coverage, the Sybase soft-ware gave us the audit trail to ensure that the device waspassword protected.

  • 8/2/2019 Dummies Guide Mobility 2010

    25/48

    19

    Software and inventory management

    A leading device management solution provides visibil-ity into mobile devices so IT knows exactly what devicesare deployed, where theyre located, and what softwareis installed. This provides IT with the ability to bettermanage and control future software deployments.

    Application support

    Significant management capabilities can be added tothird-party or custom applications such as initialdeployment, updating, and continual over-the-air main-tenance. This functionality can even be fully integratedinto your application via published APIs.

    Document and content distribution

    A good solution goes beyond device management andgives IT the ability to control applications and data too.Document files are securely delivered to frontline work-ers using a forced or subscription model. Documentowners have control over content and can easily add,delete, and update content so that out-of-date docu-ments in the field are automatically replaced.

    File-based information can be updated from any sourceand format, including HTML, database files, docu-ments, and other electronic content. Technologiessuch as byte-level differencing, which means replacingor updating a segment of a file (rather than the entirefile), can deliver significant savings.

    Process automationImportant tasks can be personalized and automated tomake them faster and easier for the IT administratorand user.

  • 8/2/2019 Dummies Guide Mobility 2010

    26/48

    20

    Wizard-driven point-and-click scripting allows infinitelycustomizable activities on server or client systems,automating tasks and removing onerous responsibilityfrom mobile workers. These processes can be sched-

    uled or initiated manually, or they can be triggered bythe monitoring of a third-party application.

    Scripting delivers numerous possibilities: file transfers,hard disk checks and changes, configuration changes,and even IF/THEN logic processes for complex tasking.

    System management extensionsWithin the confines of headquarters, systems manage-ment is a relatively routine task. However, this taskbecomes complicated with remote devices becausethese devices arent always connected to the network.A top-notch system simplifies these routine manage-ment tasks by enabling regular monitoring of devicesto ensure compliance with corporate policies.

    Saving time and moneyA large broadband communications company with over 3,500field service representatives increased mobile worker and ITproductivity, reduced repair time, and reaped about $500,000in annual savings much attributable to automated devicemanagement and application updates through Sybasetechnology.

  • 8/2/2019 Dummies Guide Mobility 2010

    27/48

    21

    Finding the Solution with

    Afaria, from SybaseYou know the challenges and requirements of a reallyeffective mobility management solution, and the greatnews is that Afaria meets every one of these uniquechallenges of mobile environments. Afaria is the indus-trys most powerful and flexible solution to manage

    mobility across the entire enterprise. Afaria providescomprehensive management capabilities to proactivelymanage and secure all the devices, applications, data,and communications critical to mobile success, regard-less of the bandwidth you have available.

    Afaria is an enterprise-grade, highly scalable and flexi-ble solution with a central web-based console that

    enables IT to control a host of key functions in either ahosted or direct model. As Afaria is part of Sybasesmobility platform, you can easily add other key func-tionality as your mobility needs evolve.

    Counting the savingsA leading provider of cleaning services found that manuallymoving large business-critical IT files to remote devices wascostly. It deployed Sybase technology to manage its mobiledevices and the flow of data. Staff time spent updating soft-ware decreased by 93 per cent, travel reduced by 80 percent, and shipping costs dropped by 100 per cent!

  • 8/2/2019 Dummies Guide Mobility 2010

    28/48

    22

  • 8/2/2019 Dummies Guide Mobility 2010

    29/48

    Part III

    Under Lock and Key:Enforcing Security

    In This Part Thinking about your security needs

    Reading case studies

    Laptops, smartphones, and other mobile devicesare, by their very nature, easy to lose and rarelywithin the grasp of your IT department. Theyre usuallyloaded with sensitive customer information, the risk ofintrusion is high, and security controls are often incon-sistent or non-existent. Mobile devices represent one of

    the most challenging battlegrounds in your campaignagainst data loss and theft.

    You employ your mobile workers for a variety of skills to sell, repair, inspect, and so on. Theyre not alwayscomfortable with IT and certainly not security experts.Yet, more than 75 per cent of enterprises leave respon-sibility for security in the hands of the user.

    This part delves into the security issues and, moreimportantly, the solutions you need to consider.

  • 8/2/2019 Dummies Guide Mobility 2010

    30/48

    Security: Considering

    Your RequirementsWhen thinking about security, remember that it isthree-pronged and includes:

    Availability: Systems work promptly and serviceisnt denied to authorized users.

    Integrity: Data isnt changed in an unauthorizedmanner and the system itself isnt manipulated.

    Confidentiality: Information isnt disclosed tounauthorized individuals during storage, process-ing, or in transit.

    Consider the relevance of the following list when devel-oping the policies for your organization:

    Protection for small, easily lost devices carryingsensitive information, rarely under the direct con-trol of IT technical support.

    Centralized control of all your devices and usergroups whatever the device type, platform, orlocation.

    Security policies that meet regulatoryrequirements.

    Reliable user authentication to control access tothe device and subsequently your corporate datastore.

    Protection for the data during transit and when

    its stored on the device whatever the platformor device type.

    24

  • 8/2/2019 Dummies Guide Mobility 2010

    31/48

    25

    The ability to protect the device even if you cantcommunicate with it, utilizing data fading or kill-

    pill functionality. Separation of corporate data from personal data

    and the ability to apply unique security policies tothat data.

    Future-proof solutions for new platforms andemerging threats.

    Stating the Requirementsof Your Security SolutionAn effective mobile security solution, like Afaria, enablesIT to transparently manage security requirements, whilesupporting the application and device as if the mobileworker were attached to the office LAN. All necessarytasks can occur during a single connection. Seek a secu-rity solution that delivers the following functionality:

    Password protectionPassword protection is the first step toward securingdata on mobile devices. You need a solution that offersthe ability to centrally define, control, and enforce end-user password policies. A sandbox approach is ideal forpersonally-owned devices accessing corporate data,ensuring that this data is encrypted in its own area ofthe device, while allowing unrestricted access to per-sonal data.

    Alternatively for corporate-owned devices youmay requirepower-on passwordenforcement,insisting a user must enter a password eachtime the device is turned on. If your

  • 8/2/2019 Dummies Guide Mobility 2010

    32/48

    26

    pre-determined threshold of failed attempts isbreached, device lock-down policies automati-

    cally reset the device or delete specified orencrypted data.

    On-device data encryptionData on devices and removable storage must beencrypted and decrypted with minimal user inconve-nience. In the case of a lost or stolen device, data is pro-

    tected through strong encryption and other devicedisabling policies. Through the management console,you can select what data to encrypt and when. You canalso encrypt removable storage media, such as compactflash cards and SD cards. Full-disk encryption protectsthe hard drives of laptops and tablet PCs, where theentire hard disk is encrypted, not just the user data.

    This is a more secure approach and doesnt require theuser to make judgments about what files to encrypt.

    Data-fadingData-fadingis the capability for an IT administrator toautomatically lock, wipe, or reset a device that hasntcommunicated with the corporate email or manage-

    ment server after a predetermined number of days, incase a device is lost or stolen. Similar protection canbe initiated by sending a kill-pillto the device: a mes-sage pinged to the device by the system administratorthat immediately initiates data deletion or device reset.

    Over-the-air data encryptionOver-the-air encryption ensures data is protectedbetween the device and data centre. This also helpsensure that you comply with any enforced securitylegislation.

  • 8/2/2019 Dummies Guide Mobility 2010

    33/48

    27

    May the force be strong!A police force needed a single solution that would send up-to-date information wirelessly to laptops fitted within itspatrol cars. It chose Sybase because it had so many featuresabove and beyond what other providers offered: documentmanagement, hardware management, software manage-ment, and a script-writing feature. The wireless solutionautomatically starts working every time a patrol car entersthe coverage area updating information and software in 30to 60 seconds, marking and restarting the update if the carleaves the coverage area before the download is complete.Headquarters is able to send out large files to the cars includ-ing wanted posters, missing persons information, crime sta-tistics and is able to update those files automatically.

    Following the five-point plan to securityRemember the five key elements of enterprise mobile

    security: Set and centrally enforce your policies

    Authenticate the user

    Protect the data during transit and when its stored onthe device

    Secure your data if the device is lost or stolen

    Dont rely on your mobile workers for security!

  • 8/2/2019 Dummies Guide Mobility 2010

    34/48

    28

    Patch managementPatches are automatically downloaded and deployedappropriately on an individual or group basis. Usuallydetailed logs and reports are kept to show the current

    patch levels and the protection levels employed.

    The Security ChecklistConsider the following security measures in this handychecklist when youre planning a mobile securitydeployment:

    Secure the device:

    Enforce strong password protection that userscant bypass or turn off.

    Helping an electricity providershine brighter

    An electricity provider needed a solution to manage its field-force asset inspection team. Previously, this field collectionwas completed in different regions using either paper orknowledge-based systems. Utilizing Sybase technology, going

    mobile enables distribution of work orders to inspectors in thefield to capture and synchronize the asset information back tohead office, automates previously manual processes, and pro-vides secure data transfer between head office and fieldinspectors. More importantly, it increases flexibility for the fieldinspection team, giving them GPS location information for eachasset and a full maintenance history at their fingertips!

  • 8/2/2019 Dummies Guide Mobility 2010

    35/48

    29

    Remotely lock devices that are lost or stolen.

    Proactively wipe data from devices when youneed to.

    Reprovision devices in the field (automaticallyconfiguring devices for new usage, or buildinga new device with the configuration, applica-tions, data, and security policies of a lostdevice it replaces).

    Encrypt sensitive data stored on mobile devices. Manage, distribute, and install security patches

    transparently via an administrator.

    Regularly back up key data from mobiledevices to the corporate network.

    Inform users about the importance of and the

    means of protecting their information. Guard against malicious code:

    Distribute and install antivirus updates andsoftware patches immediately andtransparently.

    Prepare to tackle future threats such as the

    increase in viruses that target handheld devices. Monitor and enforce system and application

    settings each time a device connects to theLAN, keeping track of whos accessedinformation.

    Block unprotected devices from accessing cor-

    porate systems such as email. Retrieve client-scan log files to analyze whos

    accessing data and applications.

  • 8/2/2019 Dummies Guide Mobility 2010

    36/48

    30

    Secure connections to corporate networks:

    Authenticate users and devices during eachconnection to the corporate network.

    Encrypt data to ensure safe transfer over thenetwork.

    Automate an inspection that verifies compli-ance with security standards for antivirus soft-ware, patch levels, and personal firewall

    settings before allowing a connection. Block network-based intrusion:

    Distribute, install, and maintain personal fire-walls transparently via an administrator.

    Enforce software settings.

    Monitor intrusion attempts at every connectionand block unauthorized access or unprotecteddevices.

    Use exception reporting and alerts via anadministrator to identify and correct networkweak points to limit intrusion.

    Centralize control of policies and corporate

    directories: Implement centrally managed security policies

    complete with established written policies.

    Audit security policies and ensure that theyreenforced by consistent reporting.

  • 8/2/2019 Dummies Guide Mobility 2010

    37/48

    31

    The PDA prescriptionA leading hospital delivering care to nearly 700,000 patientsevery year deployed handheld devices to much of its medicalstaff. They selected Sybase technology to ensure that themost accurate information and applications are available totheir users. The data transfer process is so easy and quickthat the users can stay up-to-date all the time. Their ITdepartment uses the technology to know who has whichdevice, which software is licensed to each device, and howmuch memory remains. One of the great benefits of thesefeatures is that the IT department can keep track of inventoryand can diagnose and treat IT problems. By examining logsvia a web browser, helpdesk personnel can proactively trou-bleshoot a variety of problems.

  • 8/2/2019 Dummies Guide Mobility 2010

    38/48

    32

  • 8/2/2019 Dummies Guide Mobility 2010

    39/48

    Part IV

    Looking to the Future

    In This Part Seeking multiple components from a single vendor

    Guarding against handheld virus attacks

    Especially in the mobile industry, technologychanges faster than you can deploy! In this part we

    peer into the crystal ball at what youre likely to needto consider in the near future.

    Integrating Mobile DeploymentComponentsAs mobility is increasingly being strategically adopted,organizations are seeking a single vendor to addresstheir mobile needs. Afaria is part of Sybases mobileplatform that enables mobile application development,deployment and management for major device types. Bycombining mobile email, device management, enterprise-to-edge security, and back-office application extension,

    Sybase enables your organization to empower employ-ees to do their work anywhere, at any time, on anydevice.

  • 8/2/2019 Dummies Guide Mobility 2010

    40/48

    Keeping Up with a

    Changing WorldNew devices and even new platforms constantly chal-lenge corporate IT. As soon you try to standardize on adevice or platform, its out of date, or your staffdemand support for their own shiny gadgets!

    The line between personal and work devices is becom-

    ing increasingly indistinct. Theres a mix of enterpriseoperating systems and devices, with no clear winners.

    You need to select a vendor whos committed to sup-porting the entire mixed device needs of your company not just a sub-set.

    Managing consumer devicesManufacturers are constantly introducing new tech-nologies, and trendy consumers want the latest andgreatest devices on the market. Developing a securitystrategy for employees personal devices is no longeravoidable. BlackBerry, Google Android, iPhone,Symbian and Windows Mobile smartphones arecommon throughout the workplace, and their num-bers are only going to increase. Regardless of whethercorporate policy allows mobile devices to access thecorporate network, workers still bring them into theoffice, potentially causing problems that must beaddressed by IT management.

    34

  • 8/2/2019 Dummies Guide Mobility 2010

    41/48

    35

    Keeping costs downDont worry a strong mobility management solutioncan help to reduce costs! By allowing employees tobring their own devices to the enterprise, initial outlaycosts are saved. Bigger savings are to be had in termsof ongoing user support. Device user interface and OScapabilities tend to represent a large portion of usercomplaints to IT from simple usage questions to com-plaints about wanting a newer device model. All thatgoes away with the support of personally owneddevices, since the user is now in control of choosing adevice theyre comfortable with.

    Heating up for the fire brigadeOne of the largest fire brigades in Europe selected Sybaseto provide its mobile management solution to update anddistribute risk information and building plans to over 150 fireappliances. The solution ensures all fire appliances areequipped with an up-to-date plan of all major risk buildingsin their locality, to facilitate a fast and efficient emergencyservice, as well as to satisfy regulatory legislation. Probablythe most important feature of the deployment is that itensures data is standardized throughout the force so that ifan emergency is large enough for more than one station tobe involved, everyone is working from the same information.

  • 8/2/2019 Dummies Guide Mobility 2010

    42/48

    36

    Avoiding Viruses

    Like the PlagueViruses are predominantly the curse of the laptop anddesktop world, but handheld virus attacks are becom-ing increasingly prevalent since the first PDA virus wasreported way back in 2004. As the devices becomemore popular, expect threats to your business to

    increase too! Choose a management and security solu-tion that counters this risk.

  • 8/2/2019 Dummies Guide Mobility 2010

    43/48

    Part V

    (More than) Ten Top MobilityManagement Tips

    This part is small but packs a punch! Here are ourtop tips for both the systems administrator and themobile worker.

    For the corporate systems administrator:

    Implement a system that enables you to manageboth personally-owned and company-owneddevices. A flexible system can help to reducecosts and keep employees satisfied.

    Centrally enforce security policies on mobiledevices. Dont leave it up to the end-user to turnon password software, encrypt data, or keep anti-

    virus software up-to-date. Implement a back-up system to protect corporate

    data. Dont expect mobile workers to back uptheir own systems regularly. The back-up systemneeds to work even over slow dial-up connectionsand be completely unobtrusive to the user.

    Utilize software that enables remote configura-

    tion of all your current and anticipated mobilesystems. You can then maintain browser andsecurity settings centrally, as well as control useraccess to various enterprise applications.

  • 8/2/2019 Dummies Guide Mobility 2010

    44/48

    Keep an up-to-date hardware and softwareinventory along with a back-up of all users data.

    Doing so helps you get the user up and runningfaster if the worst does happen.

    Provide your mobile workers with top levels ofsupport. Your workers are on their own andtheyre generatingrevenue for the business takegood care of them.

    For the mobile worker: Push your IT people to provide an automatic

    back-up system for your data. This relieves youof the burden of remembering to back up yoursystem every day, and ensures that you have themost recent patches and bug fixes, automaticallytransferred to your device.

    Change your passwords regularly. Dont use onesthat others could easily guess such as yourspouses, childs, or pets name.

    Be wary about where you browse on theInternet. Control security settings to maximumorconsider disallowing internet access. Some

    unscrupulouswebsites could be spying on youand your data.

    Be careful about who you open emails from.Dont open a message from someone whose nameyou dont recognize, particularly if it has anattachment.

    Dont abuse the system by loading software that

    could impact its use for your job. Remember thatthe system is a tool to help you work efficiently.

    38

  • 8/2/2019 Dummies Guide Mobility 2010

    45/48

  • 8/2/2019 Dummies Guide Mobility 2010

    46/48

  • 8/2/2019 Dummies Guide Mobility 2010

    47/48

    Afaria supports the widest range of mobile operating systems availabletoday, and helps you stay ahead of the curve for tomorrow.

    OUT OFPLANNING FOR THE

    FUTURE

    TAKE THE

    GUESS WORKTAKE THE

    GUESS WORK

    See for yourself how Afaria can help enterprises manage and secure iPhones,BlackBerry smartphones, and other popular mobile devices at sybase.com/afaria

  • 8/2/2019 Dummies Guide Mobility 2010

    48/48

    Choose the right

    mobile deployment solutionIn order to do their job, your field personnel

    need the right information at the right time,

    on reliable devices. And, of course, security

    is vital. This minibook makes it easy for IT

    administrators to successfully mobilize

    their organization showing how tosecure mobile data, manage devices and

    applications, and unleash the potential of

    the mobile workforce.

    Manage your

    mobile devices

    and applications

    Secure your

    mobile data

    Unleash your

    mobile work-

    forces potential

    Find listings of all our books

    Choose from among manydifferent subject categories

    Sign up for eTips atetips.dummies.com

    Secure and manageall your mobile devices

    Explanationsinplain

    English

    Getin,getout

    information

    Iconsandother

    navigationalaids

    Adashofhumourandfun