Tag: tablet management
Posted by Brandon Hill
It used to be that to buy something the consumer would just walk up to the cashier to get the items scanned and then pay. With the rise of mobile it’s becoming more common for the cashier to be roaming the store in search of a customer ready to check out all in the name of streamlining the customer’s experience.
Last holiday season Urban Outfitters used more than 300 iPod Touch devices as point-of-sale (POS) systems, and anticipates in the future that 80 percent of Urban Outfitter staffers will carry them to help with transactions.
While the emergence of mobile devices as POS systems creates convenience for shoppers and employees as well as less costs going into cash register acquisitions, it spells a problem in the form of managing the devices.
Earlier this year, beauty product retailer Sephora followed Apple’s lead by ditching its traditional POSes in favor of iPod Touches. With a list of retailers implementing pilots in an effort to reduce customer wait times the worry is if those devices need to be managed, and how is that going to be done?
The trend of mobile devices replacing cash registers isn’t going to slow down anytime soon, especially if you believe Square’s report of their volume last year. Mobile Payments Today published an infographic (also posted below) centered on mobile payments and stated that a mobile device as a credit card processor as one of the second-most hyped forms of mobile payments.
Companies need to make sure a policy is in place to manage all these devices and a central location to wipe them if they turn up missing.
Compliments of MobilePaymentsToday.com
Still in its infancy the B.Y.O.D concept has a lot of companies and influencers “land grabbing” to be the leader in providing a solution that solves the inherent risks when you allow employee devices into the work place. As we are in the MDM market we have our opinions on some of the top things IT managers need to consider from a management perspective.
One of the things companies need to know is simply what is on each phone that could cause a threat. This can be a bigger concern with Android more than iOS because Android phones are running different versions of its OS. With iOS, if there is a threat from an app then it will likely affect all iOS devices. With Android you need to narrow it down to the phone, OS and where they got the app.
Another consideration is email provisioning and policies, because a lot of security issues come from email. A lot of employees are just connecting to their company’s exchange server, but IT managers need to be proactive and know who is connecting so they can make sure the phone can be wiped if they leave or lose the smartphone/tablet.
Finally, companies should consider creating a policy or some strict requirements for B.Y.O.D. For example, IT should consider banning phones which have been jailbroken. Those phones can introduce more vulnerability into your network, and while it is the employee’s device, it’s still your network.
What considerations would you add? Post them in the comments below, or start a new discussion about this or any mobile ecosystem topic in our LinkedIn group.