Category: Mobile Application Management
Posted by Brandon Hill
The following comes from Mike Temple, Product Manager for Wavelink.
We recently introduced our latest mobile device and wireless infrastructure management solution, designed to solve the challenges associated with managing today’s wireless ecosystem. While this newest solution, Avalanche 5.4, performs the vital functions that we’ll mention later in this blog post, we believe it’s important to call out some trends and industry movement we’ve noticed and our customers have reiterated in discussions with them about their current needs and pain points. In fact, these customer discussions and industry movements were inspiration behind the new features available with Avalanche 5.4.
- Integration of iPads and other consumer devices on factory or retail floors: You might have noticed while you were doing your holiday shopping a couple months back that there was a noticeably greater amount of iPads ringing you up, in place of the traditional POS systems or cash registers. Organizations are looking to reap the productivity and employee satisfaction benefits associated with mobility. While many field tasks still require special ruggedized devices, some companies are choosing tablets that their employees might be more familiar with. For this reason and because of the conversations we’ve had with customers beginning iPad or Android-based device deployments in 2013, we knew it was important to optimize the support for iOS6 and Android platforms for the new version of Avalanche. (more…)
Securing the First Responders: With today’s critical infrastructure threats, how can you ensure your city’s response team’s rugged devices are secure?
Posted by Gemma Randazzo
In an emergency first responders need to be focused on their number one priority – be it saving lives, protecting citizens and preventing crimes. Worrying about the security of the technology they have with them shouldn’t be of concern. In fact keeping onboard laptops and smartdevices that are the make-up of numerous fleet vehicles, such as police and fire vehicles secure shouldn’t even be a secondary thought. It should be simple and should just run in the background. With technology changing rapidly it is vital to ensure information that is sent to public servants, law enforcement officials and military personnel is secure. But while technology is changing rapidly it doesn’t mean that budgets are increasing to account for all these new devices or the changing climate of new threats.
Simple to use, simple to manage device management that protects the infrastructure of every city’s government is possible and in most cases requires very little in way of investment.
What should a city or government entity look for in a mobile device solution?
- 802.11 provisioning with industry standard encryption and authentication protocols
- Access Point (AP) detection and reporting with various IDS-oriented enhancements to assist with identification, alerting, monitoring and reporting of potential threats and a holistic view into the state of the agency’s security
- Ability to remotely manage configurations and updates of all Access Points across a city from one location
- Encryption of all communication channels and database encryption
- Device location mapping; enabling the lock down and wiping of devices when needed
- Push down all device software updates over the air without the need to physically bring in critical devices that are needed 24/7. Industrial laptops are powerful tools but they can be rendered virtually useless in an emergency if they are not kept up-to-date. Push down a security patch from a central location and save critical time and money
- Device management that doesn’t take up valuable bandwidth. Send out a software package in seconds without it hindering GPRS that is being used not only to update software applications but basic data communications with officers and firefighters out in the field
- Security for all wireless data transmissions that includes a seamless handoff between the various wireless network infrastructures in operation
Remember you don’t need to buy the latest and greatest device with the pretense that because it’s newer it’s going to be more secure. By making simple IT infrastructure changes using existing devices it is more than possible to stick to the budget without sacrificing security. A simple to use centralized mobile device management solution that plans, deploys, secures, monitors and maintains enhances the reliability and security of the tools first responders need to use.
Posted by Kelly Ungs
The consumerization of IT gets a lot of attention these days. BYOD is being seen as a headache by that virtually every IT department is struggling with it, and it the problem is quickly escalating. Users are doing more than bringing in their own devices; they’re downloading applications and using services – some free, some not – without IT’s permission, or even knowledge.
What has gotten much less attention but is equally important is the reverse trend: the IT-ization of the consumer. Employees may be bringing their own phones and laptops onto the network, but they’re also doing more to address issues they would have taken to be addressed by IT in the past. Gen Y is blasting into entering the workforce with a vengeance. They grew up with computers, and many prefer to fix their issues themselves. And they’re not the only ones. The pervasiveness of smartphones and other tech has made everyone from baby Johnny to Grandma Sally more familiar and comfortable with technology.
There are upsides and downsides to this, but the bottom line is that these two trends – consumerization and IT-ization – are presenting IT with a golden opportunity to transform their value to the organization and move from a firefighter role to a business enabler that provides value to the bottom line.
The primary downside that keeps many organizations from embracing the IT-ization trend is the loss of control. When users are in charge of fixing their own problems, finding their own applications and installing their own solutions, who knows what they’ll end up installing? However, empowering your end users doesn’t have to mean totally giving up control. There are solutions on the market that will enable you to provide easy and pre-approved solutions to your end users, ensuring that workers they find the tech they need without resorting to potentially insecure software. LANDesk is one provider of such solutions, with their shopping cart feature.
On the other hand, the upside for IT is big. By empowering the end user through IT-ization, IT folks free up much of their own time. Instead of focusing on closing tickets or fighting fires, IT can is able to work more closely with the business units to determine where there are inefficiencies, redundancies and opportunities areas for improvement. IT can use that “extra” time to develop custom applications to solve fulfill the unique problems of your organization.
IT is on the cusp of a major change. Even though many fear that BYOD, consumerization and the increased self-reliance of IT-ized end users may eventually cost them their jobs, the exact opposite is true. Now is the time for IT to make itself an indispensable business partner by giving workers access to what they need when they need it.
Posted by Brandon Hill
Consumers adopt new technology much faster than businesses. For instance, many are in line at the Apple store the day the latest iOS-based device is available. Imagining a similar scenario for the IT department is almost laughable. Not only would the IT team have to buy hundreds to thousands of those devices (depending on the size of their enterprise), but they would then have to spend hours upon hours individually setting up each device to be secure, compliant and easily manageable. Then, there’s the actual expense of such an endeavor.
It’s no wonder that the majority of end-users feel they have better computing technology at home than they do in the workplace. And because they have become so accustomed to using newer, more advanced devices at home, they are requesting this same technology in the office. And who can blame them? These devices are often faster, easier to operate and they are what the user feels most comfortable with.
That said, as mentioned above, many IT departments do not have the budget or resources to supply end-users with the smart devices they have become accustomed to in their personal lives. Thus, IT faces the issue of pooling its often strained resources to provide end-users with these devices or in letting them engage in BYOD behavior.
Posted by Brandon Hill
With plenty of 2013 predictions focusing on the continued rise of mobile, we imagine that many IT organizations will be revisiting their MDM “wish lists” and redefining their focus areas to address the new set of challenges anticipated for the year. To help prepare you for 2013’s challenges, we’ve highlighted a few MDM resolutions to consider for your IT and overall business success in the coming year.
Plan for BYOA (whether or not your company allows BYOD)
Even if the mobile devices your employees are using are company-owned, and personal devices aren’t sanctioned for business use, your IT department will likely recognize (if yours hasn’t already) a need for an application management strategy. Not only are consumers accustomed to using the same mobile devices they use for work to play Angry Birds, but the increasingly self-reliant workforce is comfortable finding their own external programs and applications to help with job productivity. These apps could include programs that put sensitive company data at risk of being lost or compromised. Address the issue of potentially harmful apps by implementing a management strategy that grants access to previously-blessed programs or prohibits access to those that may be risky. Enterprise app stores that work in tandem with your MDM solution can help align BYOA plans with the overall management of the device.
Keep Considering Consumerization
Basic mobile device management begins with support of popular operating systems and consumer-like capabilities. Embracing this reality helps create a working environment that delivers an optimal employee user experience, increased productivity,
and an overall familiarity in approach that employees will appreciate. Recently, Gartner reported that IT departments have increasingly
shaped their enterprise device offerings with consumer preferences in mind. Gartner points out that the presence of Android and iOS will only increase in the enterprise. With more and more companies switching from traditional ruggedized devices to iPads and other consumer devices to accomplish tasks like product tracking, this year could mean potential hardware changes for your company. Consider accommodating the popularity of consumer options by choosing solutions that provide an optimized ability to manage popular operating systems.
Strengthen Mobile Security
While mobile is growing exponentially, you can expect that security risks to your mobile devices will grow along with it. Some mobile devices are even expecting new forms of cyber attacks that lock the user out of the device. The ubiquity of mobile computing has already caused and will continue to cause the increased targeting of mobile devices. Safeguard your corporate devices (and devices used for business purposes) by planning for these types of attacks. Make sure you have the ability to locate any lost devices, remotely wipe, lock or reset as well as manage what can be downloaded to them.
What do you think of those resolutions? Would you add or remove some?
Posted by Kelly Ungs
As IT organizations everywhere are restructuring their budgets for 2013, figuring out where their company should be spending and how much, it’s no secret that one of the areas that will require some careful consideration is BYOD. While there is certainly not a “one size fits all” approach, with clear-cut benefits to guide your organization’s decision on whether or not to support personal devices, there are certainly many aspects and even myths to mull over.
In the spirit of the holiday season (and finalizing IT spending for next year), I’ve made a naughty and nice list, which takes a quick look at a few pain points and things to look forward to, as you work toward implementing or fine-tuning a BYOD policy within your organization.
Hidden Costs: On the surface, BYOD comes across as a cost cutter, with the $70-ish per month required to operate the device falling to the end user. What organizations need to remember is that increased personal devices translates to increased mobile device management, which means you’ll need to invest in a reliable toolset to power and manage your BYOD environment – whether that means hiring additional manpower, or deploying an MDM solution that will help you safely and efficiently roll out your BYOD program.
Security Scares: As personal devices will consistently come and go, in and out of the corporate network, BYOD reasonably presents some concerning potential scenarios, such as external exposure of confidential emails, contact lists or sensitive company financial information. While IT can certainly take steps to safeguard information once the device is known to be lost, many employees don’t set up a password to secure their device (in a recent survey, only 29 percent of users reported they set passwords to keep their devices locked), and several minutes or hours can pass before he or she knows the device is lost. Employees holding out hope that their device will be found may even wait days before reporting the device missing to IT.
Too Many Toys to Track: Shiny new devices are popping up all the time, especially around the holidays. This can be especially problematic as it seems employees are walking in with new tablets right after IT has made a buying decision on which operating systems they’ll support with their MDM solution. IT has a tough decision to make: “should I focus on keeping up with the latest and greatest to satisfy all of my end users personal preferences, or only support a select number of systems and hope my end users don’t attempt to connect unsecured devices to corporate resources?”
Hidden Savings: After carefully considering the total cost of ownership of mobile assets, some companies have actually managed to capitalize on their decision to allow BYOD, such as Cisco, which recently told InformationWeek they’ve been able to reduce costs per user by 30 percent, despite a 98-percent increase in device count.
Controlled Productivity: While there are certainly risks associated with granting employees access to company info while on the
go, mobile device management has also come a long way in enabling IT to govern when, where and who can access the files needed to get the work done. Most MDM solutions now come with policy-setting features that allow IT to grant or disable access to specific applications or files. With devices that enter the enterprise without IT knowledge or consent, there are also default policies that can be applied to give the unknown device basic access to company Wi-Fi but maybe not email or enterprise apps.
You Can Satisfy the Majority: While some organizations may deem it more productive to support each employee’s individual device preference, most companies run a successful BYOD program by managing the most popular operating systems – such as iOS, Android and Windows. A quick survey of your employees’ device OS “wish lists” should help you identify the majority rule for your company.
As you can see, there are opportunities and concerns associated with several, if not all aspects of BYOD. The key to rolling out your BYOD plan for 2013 is in evaluating how your company could potentially benefit versus how much you’d need to invest to maintain the benefits and safeguard against the potential pain points. Are the benefits really “nice,” or could they end up turning “naughty?”
Posted by Brandon Hill
I came across an interesting read from Forbes that was posted over the summer about the growing threat of mobile device security. It has some fascinating figures on mobile device usage and the inherent risks associated with our growing demand on mobile technologies. It’s becoming such an issue, that the White House and other leaders are entering the discussion.
Some of the more interesting (and/or frightening) highlights include that “six out of every 10 cyber-security breaches occur as a result of a mobile device.” Why is that an issue? Well, consider the following that the author, Kevin Johnson points out:
We’ve reached an inflection point where the lightning-fast adoption of powerful, smart devices is outpacing our ability to secure our mobile lives. In a world of 7 billion people, there are now 5.9 billion mobile-phone subscribers. Here in the U.S., we have more mobile-phone subscriptions than people. The mobile Internet that we’ve come to rely on ― for everything from financial transactions to business operations to emergency-response procedures ― is increasingly vulnerable.
Think about that. In the US, we have more mobile-phone subscriptions than people. Take into account that many, if not most, are accessing some combination of personal and corporately-liable informations, and you can see why the issue is being trust onto center stage. Take a look at the article and let us know what strikes you the most about it. It’s a good read.
Posted by Brandon Hill
The following comes from Mike Temple, Product Manager for LANDesk and Wavelink. You can check out some of his other posts at the LANDesk Blog, located here.
“As you may have noticed if you’ve been to the grocery store lately – or anywhere with music playing on the overhead speakers – the holiday season is here. While it officially kicks off with Black Friday later this week, if retail music choices are anything to go by, it’s already here.
With Nordstrom’s, JC Penney and Apple leading the charge, consumers will be seeing a lot more sales staff using mobile devices to ring up their holiday purchases this year. Consumers aren’t the only ones who are seeing more of mobile devices. IT departments, who have managed mobile devices in the warehouse for many years, are now being asked to support devices in both their corporate offices and on the retail floor.
For those asked to manage the rapidly expanding number of devices, finding the right solution can be daunting. There are a lot of places to look for information, including the NRF’s Mobile Initiative and the Enterprise Mobility Forum. We also invite folks to check out our mobile ecosystem LinkedIn Group.
Before you leap into the mobile device management fray, it’s good to start with a framework of issues to consider:
– What does your mobile ecosystem look like? Wavelink’s interactive Facebook app can help define your mobile ecosystem and some of the management concerns associated with the different types of mobility. Don’t forget to take into account your wireless infrastructure as you’re defining your ecosystem.
– How are those mobile devices being used and what systems do they need access to? Mobile devices in the warehouse will need different programs and levels of access than those used on the retail floor or those used in corporate offices. Make sure the solution you decide on can accommodate these different levels of policy needs.
– What types of devices are being used? While it’s obvious that the ruggedized devices used in the warehouse will be different from the devices used in the corporate office, there will still be a few different types of devices and operating systems being used in each part of the mobile ecosystem. The solution you decide on should be able to support these different systems.
– Are there plans for expansion? If your company is planning to expand retail operations (more devices on the floor and in any additional warehouses) or add additional corporate offices, how will the solution you choose adjust to your expanding number of devices?
– And of course, cost. What is your budget for a management solution? Remember that you can often save a bit of money by purchasing solutions that cover a suite of IT issues and doing away with some of the point tools being used. This can also lead to a more efficient and effective IT department.
Remember, mobility isn’t necessarily good or bad, but it can cause your organization serious problems if it isn’t managed, such as lost productivity, increased costs or security breaches. These devices are here to stay, whether IT is prepared or not. Proactive consideration of a management solution can save you a lot of headaches later on.”
Posted by Brandon Hill
Good afternoon everyone! Nearly all of you are familiar with Gartner, and next week they will be holding the Gartner Symposium ITXP in Orlando. Our sister company, LANDesk, has some big news that will be announced at the show. Below is a guest blog post from Steve Workman, LANDesk’s VP of Product Management.
“Network World recently reported on a survey finding which stated the average enterprise user will have 3.47 devices by 2015 and 6.58 devices by 2020. For me, it’s already difficult enough to juggle a smartphone, laptop and tablet, so imagining carrying at least 6 devices within a decade is a bit daunting. And that’s just from the end-user perspective. Just imagine how IT feels!
Not only does IT have to consider the management, compliance and security of all of these devices but then there is the issue of cost. With the standard device-based pricing model applied to 6 devices per user in an enterprise a few thousand, the numbers don’t look good…
Clearly, the consumerization of the enterprise and BYOD model have changed IT forever. Isn’t it time the pricing model changed too?
We think so and will be making an announcement next week at the Gartner Symposium ITXPO in Orlando. We are thrilled about the changes we have in the works and believe they mark the way forward for the IT industry as a whole. If you’re in Orlando, please stop by and visit us at Booth #MP9 or stay tuned for our announcements via our Press Releases page. Also, don’t miss our own Jesse Frye and Ian Aitchison discussing how to “Increase Organizational Productivity Through ‘User-Oriented Management” on Wednesday, Oct. 24 at 3:15 in the Dolphin – Southern II Room.”