focus: enterprise mobility management
TRANSCRIPT
Page 1 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
In this e-guide:
If your business does not have some kind of strategy for
enterprise mobility management, then are you really running a
business at all? At the very least you’re sailing perilously close
to the wind when it comes to enterprise cybersecurity.
In this e-guide, we will explore exactly these topics, looking in-
depth at some of the key trends and developments in the world
of enterprise mobility, as well as keeping a watchful eye on
cybersecurity.
First, BrianMadden.com’s Jack Madden rounds up the
fundamentals of enterprise mobility management, and reveals
why it’s important for you to understand it.
Still not convinced you need to manage how your employees
use mobile technology in the workplace? Rene Millman looks at
the world of mobility management from the point of view of the
SME, and how to maximise the potential of mobile tech.
Page 2 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Meanwhile, in the land Down Under, organisations are mindful
of the productivity and flexibility benefits of enterprise mobility,
yet remain determined to achieve systems governance to
protect themselves. Beverley Head examines the Australian
holistic approach to enterprise mobility.
Finally, security consultant Kevin Beaver offers up some tips
on enterprise mobile security, looking specifically at password
management best practice. Traditional approaches to
passwords are no longer valid, Beaver argues, and IT
departments need to find new ways to manage both users and
applications.
Alex Scroxton, networking editor
Page 3 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
The top enterprise mobility management resources - February 2018 Edition
Jack Madden, guest contributor
This article is your guide to everything you need to know about enterprise
mobility management and related topics. If you’re new to EMM, you can learn
the basics. If you’re already familiar, bookmark this to find key resources. And if
you want to know our world-view on anything, we’ve got that, too.
This article gets updated every few months, most recently on February 20,
2018. For daily EMM news and opinions, head to the BrianMadden.com
homepage, our RSS feed, my Twitter account, or our Friday Notebook series.
Table of Contents
What is EMM and why should you care? Understanding mobile device and app management Identity management Mobile security and mobile threat defense Apple and iOS MDM resources Google and Android MDM resources Windows 10 MDM and Unified Endpoint Management IoT
Page 4 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
What is EMM and why should you care?
In the past, I would point to articles like In the mobile/cloud era, it’s just how we
do things, this 5-part series on the state of EMM, or this article about
“workspace” management. But in 2018, I think it’s safe to say that everybody
“gets” EMM now. Of course, we’re always watching to see what’s next, like
wearable devices, machine learning, and voice assistants.
Understanding mobile device and app management
While everyone gets what EMM is and why we have it, there’s still a lot of
complexity to unravel. Here are a few places to start:
My three-part guide to mobile app management: Part 1: Why we need MAM, but why it’s challenging; Part 2: Different MAM techniques; Part 3: MAM applied to different use cases. (You can also see a video version via my Citrix Synergy 2016 session.)
Infographic: When to use MDM, MAM, and other EMM techniques. A visual guide to how Android enterprise, iOS MDM/DEP, Samsung Knox, and mobile threat defense apply to BYOD, COPE, embedded devices, and the extended enterprise.
Android enterprise has come a long way in the last few years, so see The state of Android enterprise in 2017 and Android BYOD should be easier in 2018 (and in 2019, and in 2020...)
iOS management has been strong for many years, though lately I think it’s missing out on some important features, as described in Apple’s iOS management protocol needs to get better for BYOD. Here’s why and what they could do.
Page 5 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
For some recent thought on MDM, MAM, BYOD, and use cases, read:
What does the Microsoft Graph API for Intune mean for the rest of the EMM market?
Corporate devices are getting all the love these days, but BYOD challenges remain.
Do you let your BYOD users choose between MDM enrollment and MAM-only?
Are we too focused on typical office workers? The rise of the extended enterprise.
Mobile device management products aren’t a commodity, despite past predictions.
Identity management
If EMM applies to the mobile part of the “mobile/cloud era,” identity and access
management is one of the most important technologies for dealing with the
cloud part (at least from the end user perspective). See:
Why you need identity and access management as a service An introduction to identity Get ready for smarter identity and access management—It’s going to be
awesome! Cloud-based identity management services can work for your on-
premises apps, too
Page 6 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Mobile security and mobile threat defense
Mobile devices have a completely different threat model than desktop operating
systems. See:
A look at the official iOS and Android security reports In 2017, Mobile Threat Defense is finding its groove - Part 1 - The
landscape; Part 2 - The technology; Part 3 - The market Apple’s iOS 11 security white paper (PDF) Android.com security overview Googles Android 2016 Security Year in Review (Blog post | complete
PDF) (The 2017 version should be coming soon.)
Apple and iOS MDM resources
Most of Apple’s official iOS and macOS MDM documentation is pretty easy to
find these days:
iOS Deployment Reference, macOS Deployment Reference, and Apple TV management overview
Apple device configuration profile key reference Over-the-air profile delivery and configuration Mobile device management protocol reference (This is newly-public, it
used to be vendor-only!) Device Enrollment Program, Volume Purchase Program, and Apple
School Manager Apple Configurator (Free in the Mac App Store.)
Page 7 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Ground Control is a third-party product that’s useful for dealing with large numbers of DEP-enrolled and supervised devices.
iOS updates are usually announced in June and roll out in September with new
iPhone models, and for a few years now their have been significant spring
updates as well. Here’s the most recent information:
Apple WWDC 2017: Here are the enterprise management updates for iOS 11
Deep dive on iOS 11 in the enterprise - BrianMadden.com Podcast #131 with guests Aaron Freimark, CEO of Ground Control and founder of com, and Russ Mohr or MobileIron.
Apple announced iOS 11.3 in January 2018, and the updated Configuration Profile Reference revealed a new MDM restriction that allows IT to delay iOS updates on Supervised devices for up to 90 days. This is a big, long-requested feature, but note that Supervision is only intended for enterprise devices, so there’s still no way to prevent BYOD users from upgrading. Here are more details, via Russ Mohr.
Google and Android MDM resources
We all know the Android MDM story: Originally, Android didn’t have great MDM
capabilities, so OEMs like Samsung added their own. Then in 2014 and 2015,
Android for Work came along, and now it’s just called Android enterprise.
Things are really moving fast now, as it’s been required long enough that it
should be pretty much everywhere, and even Samsung Knox has been re-
architected to utilize Android enterprise features. Most recently, Google
Page 8 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
announced the Android Enterprise Recommended device program. Here’s
where to find more information:
The Android enterprise homepage lists supporting vendors and devices. Google’s official Android enterprise blog Android enterprise help page Managed Google Play help page Google’s Developer side for Android EMM has a lot of information that’s
valuable for anyone that wants to learn more about it. Also see the Android EMM Developers site, this test device policy
controller app, and Device Administrator documentation; as well enterprise features by version: Android 5.0; Android 6.0; Android 7.0; and Android 8.0.
You can also check out Android enterprise guides (plus other guides and blog posts) from Jason Bayton.
Samsung Knox provides EMM features that can be used on top of (and
underneath) Android enterprise. See:
Our overview of Samsung Knox MDM. SamsungKnox.com homepage and blog. (Not update often, but
sometimes has posts about new versions of the Knox API.) Developer Guide for Knox 3.0/Android enterprise unification. Knox SDK and developer tools, support, feature list, and partner
program.
Page 9 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Windows 10 MDM and Unified Endpoint Management
Windows 10 brought Modern Management and support for MDM, and now a
new trend (and confusing acronym): Unified Endpoint Management. Here are
some recent blog posts:
How Windows 10 co-management works with SCCM and Intune/MDM, and how third parties can use it, too
Put your Windows 10 deployments on AutoPilot
And here are shortcuts to Microsoft’s documentation:
Co-management information in the SCCM 1709 preview Overview of Windows 10 MDM All of the MDM APIs available for Windows 10 Newer MDM APIs in more recent versions of Windows 10 MDM Migration Analysis Tool
IoT
Gabe and I have written a couple recent articles on the Internet of Things:
IoT and IT/OT convergence. EMM-managed IoT versus 3-tier IoT. Brian Madden (yes, Brian!) popped back up in the industry recently and
gave a great session on IoT and how it relates to EUC at Igel Disrupt—here’s a video.
Page 10 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
How to find the right mobility strategy for your SME
Rene Millman, guest contributor
When budgets are tight, as they are for most small and medium-sized
enterprises (SMEs), having a mobile strategy may seem an extravagance.
However, most businesses use a mobile device in one way or another, so
maximising their usefulness is a must.
According to the Office of National Statistics, (ONS) the amount of people
regularly working from home has risen to 4.2 million in the last decade and it’s
expected that half of the UK’s workforce will be working remotely by 2020.
Furthermore, the latest figures from the Department for Business, Innovation &
Skills (BEIS) say that 16.1 million people work for SMEs – 60% of all private
sector employment in the UK.
According to Myles Leach, managing director at voice-over-IP (VoIP) firm Nfon
UK, it stands to reason that SMEs are and will continue to be affected by this
change in working trends: “Employees need and want to have the opportunity to
work flexibly. But crucially it benefits the SME. It saves on office space and
costs,” he says.
Page 11 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
“Operations can continue when a site is shut because of bad weather or for
maintenance. There will invariably be fewer staff ‘sick days’ as they can still
work during school holidays and when children are ill.”
Bringing mobile into SMEs and bring things up to date
What works for one SME won’t necessarily work for another, but before
adopting a mobility strategy it’s important to look at what’s already in place, to
determine where changes need to be made. According to Andres Richter, CEO
at cloud ERP specialist Priority Software, in a survey his firm carried out of 500
UK senior decision-makers, over a third did not have the correct technology to
support mobile working, and 43% couldn’t perform business-critical functions on
a mobile application.
“If the company already has business software applications in place, they
should see if their vendors already offer mobility tools. For example, many
modern ERP systems now support mobile application generators which allow
users to create a range of applications from their mobiles and use them to
perform core business processes no matter where they are. These can be
created in a matter of minutes, and don’t require high levels of IT expertise,
perfect for SMEs looking to enhance their mobility strategy using existing
technology,” he says.
Jon Wrennall, chief technology officer at cloud software supplier Advanced,
says that SMEs should look to place employees at the heart of their mobile
Page 12 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
strategy, “empowering them to use mobile technology to streamline their tasks
and minimising the chances of departments working in siloes”.
He adds that SMEs can use the cloud to help facilitate mobile working, which
enables users to work on the move and still have all the real-time information
they need at their fingertips.
“The cloud is a key driver in making mobile strategies success but implementing
such a strategy is often seen as a bold move as some SMEs lack confidence in
adoption and don’t understand the positive role it can play,” says Wrennall.
“SMEs should therefore look to take incremental steps. For example, they can
trial mobile technology will a select set of employees who can then share
feedback with those that aren’t yet familiar with it. It also enables SMEs to
assess areas for improvement,” he says.
Device and service choice
Wrennall said that when it comes to devices and service choice, not everyone is
familiar with mobile devices. Some will be more receptive to changing their
working practices, while others might not.
“SMEs should give more support to those that need it and educate them on the
benefits of mobile and the cloud. They should work closely with staff to find out
their pain points, as this will determine what devices and services they choose
to implement,” he says.
Page 13 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
He adds that a move to a mobile strategy should be considered with the same
level of due diligence as any other significant investment within a business.
Before choosing what device or service to adopt, SMEs must consider how a
transition will impact their staff and customers as well as choose a provider that
can illustrate a clear and structured pathway for moving staff and data to mobile
technology as smoothly as possible.
“Device and service providers must be able to show they are going to be a long-
term value adding partner and that they’re in it for the long haul,” says Wrennall.
Organisations would be well advised to use just one type of device or at least
minimise the number of unique hardware/software configurations,” according to
Jack Zubarev, president at Parallels, a supplier of desktop and application
virtualisation software.
“The cost of delivering and supporting applications simply increases with each
unique device/software combination. Further device replacement and refresh
will become far less expensive if one can standardise not just on device vendors
but on the specific configuration(s),” he says.
“But then again, most organisations do not have the luxury of this
standardisation as employees bring their own devices. In this case universal
remote delivery of applications to any device, will likely provide the most cost-
effective solution and isolate software delivery from underlying device
hardware.
Page 14 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Making mobility secure
SMEs are in as much danger from cyber criminals as larger enterprises. David
Emm, principal security researcher at Kaspersky Lab, says that if SMEs
overlook mobile security, they run the risk of leaving a big gap in their security
defences. He adds that his firm detected 5,730,916 malicious installation
packages, 94,368 mobile banking Trojans and 544,107 mobile ransomware
Trojans in 2017.
“One of the dangers is that mobile technology ‘creeps’ into the business and
isn’t necessarily considered in the same way as desktop or laptop
security. Consider the BYOD [bring-your-own-device] trend, for example, where
staff use their own devices for business,” he says.
“This isn’t a bad thing per se, but it’s important that businesses include mobile in
their risk assessment, just as they would for any other technology they use: i.e.
looking at what assets they have, how are they used, how is data stored/moved,
who has access to it, who might want it and how might they try to access it
etc. In this sense, mobile security should be considered as part of an overall
security strategy.”
One of the biggest trends affecting mobile strategy and security is BYOD. “No
longer can organisations insist on a device to be used by employees,” says
Clive Longbottom, service director at Quocirca. “This is made worse by the
changes in workforce – contractors, consultants, specialists and so on cannot
Page 15 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
be forced to use a specific device, but can be forced to allow the organisation to
create a secure partition on their device.”
Employees at smaller companies may not realise that, when downloading an
app, where that app came from.
“Employees can search on an App Store and find any number of apps that
purport to be able to do what they want. Individuals tend not to even check to
see where the developer comes from (for example, Russia or China) and will
have no capabilities to check the traffic between their device and the backend
servers,” says Longbottom.
“By creating a secure partition, users can be prevented from loading apps on to
it, with only the company-approved apps being available to them. Sure, the
individual can still install apps on their part of the device, but these apps will not
have access to any corporate data.”
Putting best practice into your mobile strategy
Priority’s Richter says the best tip is to understand where in the business a
mobility strategy will add value. “Is it more important for your HR and accounting
team to be mobile, or your field service reps? Although the end goal should be
full mobility across the board, initially, instead of trying to do everything at once,
being selective about what parts of the business would benefit from going
mobile will increase the chances of a strategy sticking,” he says.
Page 16 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Leach says that line managers must be confident that staff are aware how to
use, and are using, technologies available so that employees are just effective
at their job when out of the office.
“There also need to be clear policies for working from home, such as allocated
days and shared calendars. However, the most crucial factor to ensure a
successful mobile strategy is creating a positive culture for mobile working. Do
employees feel comfortable asking for and then working from home? Do
you trust that they will be working, or do you think that they will be swilling tea all
day whilst signing for neighbours’ Amazon deliveries?” he says.
Should SMEs worry about 5G? What does the future hold for SME mobile
strategies?
At some point in the next few years, 5G networks will begin to be
commercialised. 5G devices should be expected to consume less energy and
thus improve battery life. 5G networks will have higher data rates and lower
latency than previous mobile generations.
These new networks will come with features to give companies better mobility
and flexibility. This will be useful for SMEs with remote employees being able to
work anywhere and retain workplace-like bandwidth and connectivity.
The internet experience of 5G for field employees will be better in a number of
ways. Internet-connected vehicles and machinery can be more easily monitored
Page 17 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
in real-time. It should also be easier to get analytical data into management
hands to enable quicker decisions wherever employees are. These should
make an impact on a business’s productivity.
Page 18 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Australia's holistic approach to enterprise mobility
Beverley Head, guest contributor
A sea change is underway in how organisations tackle enterprise mobility in
Australia. While mindful of the productivity and flexibility benefits of enterprise
mobility, Australian organisations are still determined to achieve systems
governance to ensure security and preserve privacy.
This has prompted a more holistic approach to enterprise mobility management,
often resulting in companies selecting service-based rather than point products.
According to research firm IDC, Australia is one of the most progressive
markets for enterprise mobility in Asia-Pacific and Japan, with organisations
having shifted “from a defensive posture to a proactive approach regarding their
employees’ use of mobile technologies”.
Heralding that shift was the Australian Bureau of Statistics, which had sent out
33,000 officers to run the most recent census using a mobile app running on
their own mobile devices rather than rely on paper forms. The app was
deployed and secured by MobileIron, an enterprise mobility software supplier.
Page 19 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Sabharinath Bala, senior research manager at technology research company
IDC, says until recently, the focus with enterprise mobility management had
been on device security, so if a smartphone was lost or stolen, its content could
be wiped, and the device locked.
However, enterprises today are now adopting all-encompassing methods to
secure all content and applications accessed beyond the walls of their
organisations. “That is the prime concern for larger enterprises and large mid-
sized companies,” he says.
Bala noted that industry players like MobileIron, VMware and Microsoft had
already acknowledged that protecting content was far more important than just
securing devices. That content also includes data transmitted over
communications networks, including unsecured wireless hotspots.
Exponential growth in adoption
Michelle Bendschneider, executive director for Telstra Global Products, says
there is currently evidence of “exponential growth in adoption of enterprise
mobility solutions”.
“Five years ago, it was very softly controlled adoption,” she says, adding that
with disruptive technologies such as cloud-based apps and services, companies
of all sizes – from small businesses to large government departments – are now
exploring new ways of working.
Page 20 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
However, enterprise mobility is more than just putting mobile apps into the
hands of workers. A range of technologies to support mobile users is necessary
to realise the full potential of enterprise mobility – especially given the
experience gulf between enterprise and consumer apps.
Forrester Research, another technology research firm, recommends a more
comprehensive approach that involves the use of mobile management software
from the likes of AirWatch, Citrix and MobileIron, in concert with team
messaging platforms such as Microsoft Teams or Slack.
It also advises organisations to adopt “progressive” web apps, which are
essentially websites disguised as applications, and enhanced push notifications
to spur employees into action.
Adopting enterprise mobility
In Australia, the most enthusiastic adopters of enterprise mobility are
organisations in financial services, local and state governments, and law
enforcement agencies, according to IDC’s Bala.
The Queensland Police Service, for example, has equipped 3,000 frontline
officers with tablet computers, allowing them to access information wherever
and whenever they want.
“In split seconds, they can know who they are talking to, and whether that
person has alerts against them,” says Queensland’s police commissioner Ian
Page 21 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Stewart. “We have seen a huge increase in the number of checks done per
shift.”
The police claim the mobility project, which was rolled out through a managed
mobility service contract with Telstra, has saved 30 minutes per shift per officer
– time which can be redirected to more proactive activities than administration.
Bendschneider says the time savings mean officers can perform 100 checks per
shift, while “previously they might have done five”.
Meanwhile, Motorola Solutions has signed a A$50m deal with Victoria Police to
roll out a similar managed mobility service for 10,000 officers. Mobile devices,
apps, round-the-clock service, device management and monitoring will be
provided as part of the deal.
“Frontline officers will gain access to data when and where they need it most,
helping them to manage their essential daily tasks with increased efficiency and
safety,” says Motorola Solutions vice-president and managing director Steve
Crutchfield.
“For example, it can alert officers about potentially dangerous suspects.
Eventually, the application will free up officers’ time, enabling them to complete
administrative tasks in the field instead of back at the station.”
Page 22 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
In a separate sector, Telstra has delivered a managed mobile solution to the
NSW Department of Family and Community services, replacing a manual and
largely paper-based process of applying for community housing.
“It’s taken a 45-page application to a single online 15-minute process,” says
Bendschneider, adding that security was also a key focus given the confidential
nature of the information captured in that process.
The IoT dimension
The expected growth in adoption of enterprise-grade internet of things (IoT)
networks and devices will add an extra dimension for enterprise mobility
solutions, by demanding a more unified device management approach that
manages sensors and smartphones alike through a single platform.
Indeed, Forrester forecasts that leading enterprise mobility management
suppliers will extend their offerings with unified device management solutions,
IoT management and analytics services that offer insights based on data
collected from IoT devices.
“IoT was just a buzzword until a year back,” says IDC’s Bala. “It’s now being
deployed to take advantage of the quantum of data,” he says, noting that
Blackberry, MobileIron and VMware are all working in this area. He also predicts
greater demand for unified device management within 18 months,
predominantly from large enterprises.
Page 23 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Meanwhile, Telstra is seeing opportunities in the small and medium-sized
enterprise (SME) space. In 2018, the telco will deliver a new managed mobility
service for SMEs that includes devices, apps, network carriage and mobile
management services.
Bendschneider says the idea is for SMEs to open the box with the devices,
connect them to the network and be automatically connected to the apps and
mobile management service. The service is currently being tested as a
minimum viable product (MVP) by some organisations.
“Our philosophy is to take the sting out of the tail. There’s no need to source for
the device, set up the software or manage the logistics,” says Bendschneider.
“Instead, Telstra’s service will handle that side of the house, leaving the
business to unlock the potential productivity of mobile workers.”
Page 24 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
How to approach mobile password management for the enterprise
Kevin Beaver, guest contributor
As new mobile security threats continue to emerge, traditional approaches to
password management for the enterprise aren't as effective as they once were -
- and IT pros must find new ways to properly manage mobile users and apps.
Previous methods of password management for the enterprise included relying
on standard passwords and encouraging users to choose which apps to install
and use. As these older methods fail, some IT and security managers claim that
mobile access management is out of their control. Others attempt -- and fail -- to
enforce Windows domain password policies and user provisioning processes
across mobile devices.
When mobile security risks exist, they can compromise critical apps, their
associated content and larger business systems. And as mobile expands into
the internet of things, proper identity and password management at the
enterprise level are as important as ever.
Page 25 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
BYOD and beyond
A BYOD policy and periodic user training are no longer sufficient for password
management for enterprises. Instead, IT pros must integrate automation and
simplicity into the process. Most organizations require a level of visibility and
control over mobile apps and content that mobile device management (MDM)
and enterprise mobility management (EMM) can't provide.
MDM and EMM have evolved into unified endpoint management, which uses
aspects of modern data analytics and artificial intelligence combined with
traditional identity management approaches. IT pros can more easily onboard
and manage users and the apps they need, protecting access to business
assets over the entire user account lifecycle.
A BYOD policy and periodic user training are no longer sufficient for password
management for enterprises.
For more granular control, find a more holistic approach to password
management for the enterprise. Some ways to do this are to:
implement identity federation and single sign-on across common business apps;
use multifactor authentication to further enhance security on mobile devices;
automate user enrollment and account management;
Page 26 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
deploy enterprise mobile app management, including custom catalogs, automation and access enforcement, to enterprise resources from trusted apps and devices without user intervention;
integrate threat management and analyze apps to minimize exposures; and
use big data analytics to provide insight into past and potential security events.
Emphasize process and progress
To get started with mobile identity and password management for the
enterprise, IT pros must fully understand their requirements. IT pros should set
goals for their enterprise mobility deployment, such as a positive user
experience, simplified management and improved security.
Security should be a key part of every enterprise mobile strategy. Screen
protection, encryption and remote wipe are three technologies that can improve
mobile device security.
To measure progress on an ongoing basis, it's important to examine the
workflow. First, analyze current mobile password and app-related risks,
determine which gaps exist between the traditional network and mobile network,
and discuss mobile needs with the proper users and department heads.
Measure those risks over time to see how they both evolve and resolve. IT pros
should look at repeat findings, as well as how long it takes to address each of
their identified risks.
Page 27 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Finally, monitor for tangible policy violations, device loss and data loss to
improve processes, and understand how to adjust mobile password
management for the enterprise. Products such as AirWatch by VMware,
MaaS360 from IBM, Mobile Device Manager Plus from ManageEngine and
Enterprise Mobility + Security by Microsoft can help to simplify these processes.
In the long term, IT pros should look beyond mere compliance for their mobile
environments. Instead, strive for true security that integrates with the overall
enterprise security program -- both locally and out to the cloud.
Page 28 of 28
In this e-guide
The top enterprise mobility
management resources –
February 2018 Edition
How to find the right mobility
strategy for your SME
Australia’s holistic approach
to enterprise mobility
How to approach mobile
password management for
the enterprise
Focus: Enterprise Mobility Management
Getting more CW+ exclusive content
As a CW+ member, you have access to TechTarget’s entire portfolio of 140+
websites. CW+ access directs you to previously unavailable “platinum members-
only resources” that are guaranteed to save you the time and effort of having to
track such premium content down on your own, ultimately helping you to solve
your toughest IT challenges more effectively—and faster—than ever before.
Take full advantage of your membership by visiting www.computerweekly.com/eproducts
Images; stock.adobe.com
© 2018 TechTarget. No part of this publication may be transmitted or reproduced in any form or by any means without
written permission from the publisher.