Chris Brightwell, Senior Engineer, Kaseya
Android smartphones, iPads, iPhones and other consumer-oriented mobile devices have made their way into your organisation. Once only used by a few technology-advanced employees, today it seems that everyone has a mobile device—and they demand to use it for both work and pleasure. Bring Your Own Device (BYOD) is a reality. Unfortunately, questions surrounding BYOD remain unanswered at many organisations. If an employee device is lost or stolen, can you lock it down or wipe it? Who provides support and configuration management? How can you be sure that employees are accessing the most up-to-date applications and corporate information? Who is responsible for backups? Would your mobile device management policies and procedures pass regulatory muster?
Since managing mobile devices can be time-consuming and fraught with frustration, some companies have forbidden mobile devices. But the flood gates are leaking as employees (and senior-level executives) insist on checking email on their iPhone or downloading business documents to their tablet. You can't beat them—but you can join them without sacrificing security or your sanity. Automated mobile device management enables you to efficiently discover, manage and secure the mobile devices your employees use—and the sensitive data they contain--without manual intervention. Tools such as geo location tracking, audit and inventory and profile management streamline device management, save time and provide transparency.
Topics addressed include:
• Integrating mobile device management into your overall security strategy
• Policy management changes that support a multi-platform environment
• Implementing authentication and encryption for mobile devices
• Guidelines for corporate versus personal device responsibility and governance
• Meeting audit and regulatory requirements for mobile device management