Tag: enterprise mobility management
Posted by Gemma Randazzo
Whether you feel that BYOD is here to stay or if you feel it’s a passing trend with a hot buzzword, the reality is that employees are using their own personal devices in the work place more and more. The bigger reality is that not all of those devices have been approved by corporate IT and therefore policies aren’t in place to keep critical data on those devices safe. In a survey by AirTight Networks 37% of people interviewed said that iPads, iPhones and Android devices were sanctioned technology in their environment. Of those same people surveyed 47% said their organizations supported applications that users were accessing. Not too bad. But when further interviewed a whopping 69% said they were concerned that employees were using mobile hotspots to bypass corporate policies and were concerned about the security of data being transmitted.
With the sheer proliferation of smart devices it isn’t hard to deduce that there are a great many people who have just added their company email to their iPhone quickly and easily and didn’t give it a second thought that these devices weren’t sanctioned or a cause for concern. Checking personal and work email on the go is common for the average employee (and with the iPhone for example you can conveniently get both with one tap). So where do organizations go? Can you force an employee to turn over their personal devices when they pay the bill? What if they pay half the bill and the company picks up the other half? As a corporate IT department can you mandate that job security is directly correlated to use of a smart device? The latter is of course extreme but when confidential information is being accessed on an employee’s personal device the loss of that device could significantly hurt an employer.
A “hope for the best” attitude isn’t proactive either. That “hope for the best” attitude was what 22% of those surveyed responded with – hopefully it isn’t an organization that stores medical information or defense information. So what can an organization do? Educating employees and communicating with employees seems elementary but makes sense. Depending on your business simply asking employees to password protect access to their smart phones is a pretty easy route to take and for those organizations who know sensitive information is being access by employees, a mobile device management software solution really eliminates risks. When BYOD’s are treated like the rest of your ruggedized devices and peripherals it makes BYOD a lot less scary.
Whether it’s a lasting trend or simply a blip until the next greatest invention, airing on the side of caution means either way your data is protected.
Posted by Brandon Hill
It used to be that to buy something the consumer would just walk up to the cashier to get the items scanned and then pay. With the rise of mobile it’s becoming more common for the cashier to be roaming the store in search of a customer ready to check out all in the name of streamlining the customer’s experience.
Last holiday season Urban Outfitters used more than 300 iPod Touch devices as point-of-sale (POS) systems, and anticipates in the future that 80 percent of Urban Outfitter staffers will carry them to help with transactions.
While the emergence of mobile devices as POS systems creates convenience for shoppers and employees as well as less costs going into cash register acquisitions, it spells a problem in the form of managing the devices.
Earlier this year, beauty product retailer Sephora followed Apple’s lead by ditching its traditional POSes in favor of iPod Touches. With a list of retailers implementing pilots in an effort to reduce customer wait times the worry is if those devices need to be managed, and how is that going to be done?
The trend of mobile devices replacing cash registers isn’t going to slow down anytime soon, especially if you believe Square’s report of their volume last year. Mobile Payments Today published an infographic (also posted below) centered on mobile payments and stated that a mobile device as a credit card processor as one of the second-most hyped forms of mobile payments.
Companies need to make sure a policy is in place to manage all these devices and a central location to wipe them if they turn up missing.
Compliments of MobilePaymentsToday.com
A team member from our Seattle office shared this link about a recent study that might raise some eyebrows for any company utilizing smartphones. The first paragraph summarizes nicely;
Nearly 40 percent of smartphone users say they’re worried about security, including harmful apps, malicious emails and having their locations tracked and activities monitored. But 82 percent of them are not using security apps for their cellphones.
Let that sink in for a minute. Think about what corporate information is available on those phones. How many of your employee’s are using their smartphones to access work tasks, such as email? What would happen if that information ever got into the hands of someone it’s not supposed to?
It’s just another example of what IT professionals are dealing with these days, amidst the proliferation of mobile devices in the enterprise. Further, if you’re interested in the subject of smartphone management, check out our upcoming webinar that should prove pretty insightful on smartphone management, monitoring and securing.
Many of you saw today’s announcement about our Partnership with iPad Enclosures, a leading provider in secure, customized tablet kiosks.
Mobility is expanding, and the growing adoption of tablets in the retail, hospitality and healthcare is a perfect example of this, and we’re very excited about the Partnership. There’s a good chance many of our readers have, recently, had an experience in any of the aforementioned industries, that at some point involved an associate filling an order, checking inventory, completing a reservation, etc. on a iPad or other tablet device. iPad Enclosures customer profiles suggests as much.
We’d be curious to hear any feedback on new areas you’ve recently seen iPads/tablets used. Perhaps a recent trip to the local clinic? Last Sunday’s drive to the home improvement store? Feel free to share in the comments section, on Facebook, or via Twitter.
Posted by Brandon Hill
I came across this article thanks to the Enterprise Mobility Forums Twitter feed, and wanted to share it with you all. The article comes from InformationWeek, and discusses a few interesting topics that are very applicable to our space. There are a couple of things it highlights that I’d like to point out, and urge you to read the rest and tell us what jumps out at you. Onto the article…
First, that with the emergence of enterprise-level smartphone use, it’s becoming increasingly important for an enterprises strategy to incorporate a vender agnostic approach.
“An important outcome of this trend is that a majority of the workforce, not just the top executives, will have mobile access and will expect access to more than email. This will require businesses to change their application, development, and services strategies…”
The other item that I found particularly well put, was the summary/idea of enterprise mobility management. The author has done a great job in defining it as the next generation of mobile device management; one that incorporates new mobility and traditional aspects of MDM such as security and application management.
“[Enterprise Mobility Management] is a combination of mobile device management, security management, applications management, and services and expense management.”
Check out the complete article and tell us what you think!