Category: Mobile Device Management
Posted by Brandon Hill
The following comes from Robert DeStefano, Product Marketing Manager for Wavelink/LANDesk:
In-house estimates suggest that roughly 140 companies claim to offer Mobile Device Management (MDM). Most of them lead their messaging by waving the iOS flag and images of Andy the Android to highlight their ability to support consumer operating systems in the face of BYOD initiatives. What’s interesting is that when it comes to mobile device management, drawing attention to the iOS and Android platforms makes most MDM solutions indistinguishable from one another. Apple, for example, doesn’t allow MDM clients to take control over the device remotely. Therefore, all these MDM solutions have the same limitation. Give or take a few specification bullet points, 140 solutions provide about the same capabilities when it comes to managing a smartphone.
According to Gartner, 65% of enterprises will adopt an MDM solution for corporate-liable users over the next four years, and 90% of enterprises will be supporting two or more mobile operating systems in their environment. With so much attention drawn to the BYOD-specific needs (not to suggest these aren’t important) of a Mobile Device Management solution, there is something even larger that enterprises should be taking into consideration: Managing productivity throughout the enterprise.
Posted by Brandon Hill
The following comes from Mike Temple, Product Manager for Wavelink.
We recently introduced our latest mobile device and wireless infrastructure management solution, designed to solve the challenges associated with managing today’s wireless ecosystem. While this newest solution, Avalanche 5.4, performs the vital functions that we’ll mention later in this blog post, we believe it’s important to call out some trends and industry movement we’ve noticed and our customers have reiterated in discussions with them about their current needs and pain points. In fact, these customer discussions and industry movements were inspiration behind the new features available with Avalanche 5.4.
- Integration of iPads and other consumer devices on factory or retail floors: You might have noticed while you were doing your holiday shopping a couple months back that there was a noticeably greater amount of iPads ringing you up, in place of the traditional POS systems or cash registers. Organizations are looking to reap the productivity and employee satisfaction benefits associated with mobility. While many field tasks still require special ruggedized devices, some companies are choosing tablets that their employees might be more familiar with. For this reason and because of the conversations we’ve had with customers beginning iPad or Android-based device deployments in 2013, we knew it was important to optimize the support for iOS6 and Android platforms for the new version of Avalanche. (more…)
Securing the First Responders: With today’s critical infrastructure threats, how can you ensure your city’s response team’s rugged devices are secure?
Posted by Gemma Randazzo
In an emergency first responders need to be focused on their number one priority – be it saving lives, protecting citizens and preventing crimes. Worrying about the security of the technology they have with them shouldn’t be of concern. In fact keeping onboard laptops and smartdevices that are the make-up of numerous fleet vehicles, such as police and fire vehicles secure shouldn’t even be a secondary thought. It should be simple and should just run in the background. With technology changing rapidly it is vital to ensure information that is sent to public servants, law enforcement officials and military personnel is secure. But while technology is changing rapidly it doesn’t mean that budgets are increasing to account for all these new devices or the changing climate of new threats.
Simple to use, simple to manage device management that protects the infrastructure of every city’s government is possible and in most cases requires very little in way of investment.
What should a city or government entity look for in a mobile device solution?
- 802.11 provisioning with industry standard encryption and authentication protocols
- Access Point (AP) detection and reporting with various IDS-oriented enhancements to assist with identification, alerting, monitoring and reporting of potential threats and a holistic view into the state of the agency’s security
- Ability to remotely manage configurations and updates of all Access Points across a city from one location
- Encryption of all communication channels and database encryption
- Device location mapping; enabling the lock down and wiping of devices when needed
- Push down all device software updates over the air without the need to physically bring in critical devices that are needed 24/7. Industrial laptops are powerful tools but they can be rendered virtually useless in an emergency if they are not kept up-to-date. Push down a security patch from a central location and save critical time and money
- Device management that doesn’t take up valuable bandwidth. Send out a software package in seconds without it hindering GPRS that is being used not only to update software applications but basic data communications with officers and firefighters out in the field
- Security for all wireless data transmissions that includes a seamless handoff between the various wireless network infrastructures in operation
Remember you don’t need to buy the latest and greatest device with the pretense that because it’s newer it’s going to be more secure. By making simple IT infrastructure changes using existing devices it is more than possible to stick to the budget without sacrificing security. A simple to use centralized mobile device management solution that plans, deploys, secures, monitors and maintains enhances the reliability and security of the tools first responders need to use.
Posted by Kelly Ungs
The consumerization of IT gets a lot of attention these days. BYOD is being seen as a headache by that virtually every IT department is struggling with it, and it the problem is quickly escalating. Users are doing more than bringing in their own devices; they’re downloading applications and using services – some free, some not – without IT’s permission, or even knowledge.
What has gotten much less attention but is equally important is the reverse trend: the IT-ization of the consumer. Employees may be bringing their own phones and laptops onto the network, but they’re also doing more to address issues they would have taken to be addressed by IT in the past. Gen Y is blasting into entering the workforce with a vengeance. They grew up with computers, and many prefer to fix their issues themselves. And they’re not the only ones. The pervasiveness of smartphones and other tech has made everyone from baby Johnny to Grandma Sally more familiar and comfortable with technology.
There are upsides and downsides to this, but the bottom line is that these two trends – consumerization and IT-ization – are presenting IT with a golden opportunity to transform their value to the organization and move from a firefighter role to a business enabler that provides value to the bottom line.
The primary downside that keeps many organizations from embracing the IT-ization trend is the loss of control. When users are in charge of fixing their own problems, finding their own applications and installing their own solutions, who knows what they’ll end up installing? However, empowering your end users doesn’t have to mean totally giving up control. There are solutions on the market that will enable you to provide easy and pre-approved solutions to your end users, ensuring that workers they find the tech they need without resorting to potentially insecure software. LANDesk is one provider of such solutions, with their shopping cart feature.
On the other hand, the upside for IT is big. By empowering the end user through IT-ization, IT folks free up much of their own time. Instead of focusing on closing tickets or fighting fires, IT can is able to work more closely with the business units to determine where there are inefficiencies, redundancies and opportunities areas for improvement. IT can use that “extra” time to develop custom applications to solve fulfill the unique problems of your organization.
IT is on the cusp of a major change. Even though many fear that BYOD, consumerization and the increased self-reliance of IT-ized end users may eventually cost them their jobs, the exact opposite is true. Now is the time for IT to make itself an indispensable business partner by giving workers access to what they need when they need it.
Posted by Brandon Hill
Consumers adopt new technology much faster than businesses. For instance, many are in line at the Apple store the day the latest iOS-based device is available. Imagining a similar scenario for the IT department is almost laughable. Not only would the IT team have to buy hundreds to thousands of those devices (depending on the size of their enterprise), but they would then have to spend hours upon hours individually setting up each device to be secure, compliant and easily manageable. Then, there’s the actual expense of such an endeavor.
It’s no wonder that the majority of end-users feel they have better computing technology at home than they do in the workplace. And because they have become so accustomed to using newer, more advanced devices at home, they are requesting this same technology in the office. And who can blame them? These devices are often faster, easier to operate and they are what the user feels most comfortable with.
That said, as mentioned above, many IT departments do not have the budget or resources to supply end-users with the smart devices they have become accustomed to in their personal lives. Thus, IT faces the issue of pooling its often strained resources to provide end-users with these devices or in letting them engage in BYOD behavior.
It started with a simple $5 wristband in November 2011; Let’s Create Jobs for USA was founded with a $5 million contribution from Starbucks and a promise to create jobs for the American people. I vividly remember purchasing my wristband when they went on sale (ironically I was in the company’s hometown of Seattle). As someone who lives in a state that’s seen substantial unemployment, I was eager to play a small part in launching the movement.
As part of my weekly Starbucks visits (I won’t admit to a daily addiction), I recently noticed that they’ve taken this movement one step further by assisting small businesses on the technology payment front through a payment processing option called Square Mobile Card Readers.
Available in every company operated Starbucks store in the United States, “Square’s Mobile Card Reader with the free app, Square Register, enables anyone to easily accept credit cards so individuals and business can connect with customers anywhere their business takes them.” This simple tech attaches to an iOS or Android device and enables any size business to accept credit and debit cards. According to Starbucks roughly two-thirds of the 27 million small businesses in the United States do not currently accept credit or debit payment due to expensive processing fees and extensive applications. Think of the potential this small mobile card reader can bring to a small business and talk about a low investment – these card readers cost only $10 and come with a $10 rebate!
Say what you will about fancy and expensive coffees, but this is a highly effective tool that allows small businesses to generate new ways for income. Having said that, I won’t lie that my second thought was PCI compliance and keeping those devices secure. Any mobile device, be it rugged or consumer, has the capability to suffer a security breach. Add additional devices to your network and you further increase the importance of keeping them not only secure but maintaining peak performance. A Mobile Device Management (MDM) solution therefore still provides substantial value to any business whether you have two or three devices or two or three thousand devices.
For small business owners, a MDM solution that you manage in the Cloud is a perfect way to ensure devices are not only secure, but configured and managed from an easy-to-use console and without the need to purchase servers or an entire IT department. With MDM you also get the capability to lock down these consumer devices if they go missing and immediately protect them by securing and wiping confidential data. You even have the power to detect foreign devices entering your network and define specific parameters that your device(s) can be utilized in.
In closing, while we look at new ways to add jobs let’s not forget the critical nature of protecting the devices that come with them.
Posted by Brandon Hill
With plenty of 2013 predictions focusing on the continued rise of mobile, we imagine that many IT organizations will be revisiting their MDM “wish lists” and redefining their focus areas to address the new set of challenges anticipated for the year. To help prepare you for 2013’s challenges, we’ve highlighted a few MDM resolutions to consider for your IT and overall business success in the coming year.
Plan for BYOA (whether or not your company allows BYOD)
Even if the mobile devices your employees are using are company-owned, and personal devices aren’t sanctioned for business use, your IT department will likely recognize (if yours hasn’t already) a need for an application management strategy. Not only are consumers accustomed to using the same mobile devices they use for work to play Angry Birds, but the increasingly self-reliant workforce is comfortable finding their own external programs and applications to help with job productivity. These apps could include programs that put sensitive company data at risk of being lost or compromised. Address the issue of potentially harmful apps by implementing a management strategy that grants access to previously-blessed programs or prohibits access to those that may be risky. Enterprise app stores that work in tandem with your MDM solution can help align BYOA plans with the overall management of the device.
Keep Considering Consumerization
Basic mobile device management begins with support of popular operating systems and consumer-like capabilities. Embracing this reality helps create a working environment that delivers an optimal employee user experience, increased productivity,
and an overall familiarity in approach that employees will appreciate. Recently, Gartner reported that IT departments have increasingly
shaped their enterprise device offerings with consumer preferences in mind. Gartner points out that the presence of Android and iOS will only increase in the enterprise. With more and more companies switching from traditional ruggedized devices to iPads and other consumer devices to accomplish tasks like product tracking, this year could mean potential hardware changes for your company. Consider accommodating the popularity of consumer options by choosing solutions that provide an optimized ability to manage popular operating systems.
Strengthen Mobile Security
While mobile is growing exponentially, you can expect that security risks to your mobile devices will grow along with it. Some mobile devices are even expecting new forms of cyber attacks that lock the user out of the device. The ubiquity of mobile computing has already caused and will continue to cause the increased targeting of mobile devices. Safeguard your corporate devices (and devices used for business purposes) by planning for these types of attacks. Make sure you have the ability to locate any lost devices, remotely wipe, lock or reset as well as manage what can be downloaded to them.
What do you think of those resolutions? Would you add or remove some?
Posted by Gemma Randazzo
I recently read that logistics are as essential to the “holiday season as the Christmas tree and the Menorah.” I don’t think I need to do too much convincing at this time of the year for you to appreciate just how true that is. Just open your inbox and you are immediately reminded that if you want your holiday packages delivered before the festivities you better get a move on. As I write this an array of “final hours” emails bombard my inbox.
According to eMarketer “online shoppers in the United States will spend $54.47 billion this holiday season, up 16.8% from $46.63 billion last year.” That is a staggering number and only accounts for one country. It is easy to see why companies like Amazon are expanding fulfillment centers and opening a new 1-million square foot facility (yes, 1 million square feet) in Washington State. With the trend of online shopping only growing, fulfillment centers around the globe will continue to see their business models change to reflect that of the online consumer. Today’s online consumer appreciates the diverse number of stores they can purchase from without leaving home and driving several miles, but it also means that the instant in-store gratification is no longer there. Just because it isn’t there doesn’t mean consumers don’t still want it and for instant gratification you need logistics.
Transportation and logistics companies get items where they need to be as quickly as possible. To minimize hiccups a vital part of this process is managing the hand-held devices that get the packages to your doorstep. From the warehouse where the items are picked, packaged and shipping labels are then printed, to the logistics company picking up the package, scanning the label and then flying and/or driving it to where it needs to go. The whole time this package is tracked using a hand-held device so you can monitor its progress. If a device goes down or experiences a malfunction you aren’t going to care because you just want your package. But to businesses managing these devices is a critical component of their job after all customer satisfaction is number one. A total mobile device management effectively keeps these devices secure and up and running from anywhere in the world. In any given day there are many different “fires” for businesses to put out and with a reliable device management solution, managing and tracking all their hand-held devices is one less “fire” they need to worry about.
And with that I must go – someone changed their mind on which of the latest video games they wanted and to avoid rush-shipping charges I need to hit purchase.