Top Banner
Mobile Device Management: A Real Need for the Mobile World
9

Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

May 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

Mobile Device Management:A Real Need for the Mobile World

Page 2: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

In today’s modern workplace, employees are utilizing a variety of mobile devices both in and out of the office. Gone are the days when employees were tethered to their desktop PC – they can now do business from virtually anywhere at any time.

From smartphones to tablets, mobile devices bring added freedom to employees, but they also create an additional security risk for IT networks. Every single time an employee uses an unsecured mobile device to connect to corporate IT networks, they invite data theft into the organization. That’s why mobile device management (MDM) is absolutely critical to the security of sensitive information.

What is Mobile Device Management (MDM)?Before diving into why MDM is so critical, it’s important to understand exactly what MDM entails. Mobile device management (MDM) software monitors, secures and manages mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes data and configuration settings for a variety of mobile devices, including smartphones, tablets, laptops, mobile printers, POS devices and more. This applies to both company-owned and employee-owned BYOD (Bring Your Own Device) devices.

Page 3: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

Mobile Threats Pose Critical Risk1

Mobility threats are everywhere. Whether a device is lost or stolen, unauthorized users can easily access an unsecured device and

confidential data simply by pressing a few buttons. Whether your clients embrace a Bring Your Own Device (BYOD) model or provide

devices to their employees, it’s absolutely critical to protect their IT infrastructure against security breaches and safeguard the confidential information that can be accessed if a mobile device is lost or stolen.

Common mobility threats include: • Unauthorized access to corporate data via

public Wi-Fi networks• Mobile malware infecting corporate systems• Loss of sensitive company data stored on

devices that are lost or stolen

One of the biggest hurdles to overcome is convincing organizations that they need MDM. Oftentimes, the added

expense or effort seems too daunting, especially for smaller companies with only a handful of devices connecting to their

network. To prove the need for greater mobile security, Symantec, a leader in storage software, antivirus software, online authentication

software and online verification certificates, conducted a study called The Smartphone Honey-Stick Project1. This experiment intentionally

“lost” 50 smartphones – each had been programmed with simulated personal and corporate data, along with remote monitoring capabilities to see what would happen when the devices were found. The findings of the experiment showed:

• 96% of lost smartphones were accessed by the finders of the devices• 89% of devices were accessed for personal related apps and information

• 83%ofdeviceswereaccessedforcorporaterelatedappsandinformation

• 70% of devices were accessed for both business and personal related apps and information

In summary, unsecured mobile devices offer a direct portal into confidential data. The good news is you can stop the threat.

Mobile Device Management: A Real Need for the Mobile World LabTech Software

Page 4: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

2Stopping Mobile ThreatsClearly, there is great risk to having unsecured mobile devices connecting to a corporate IT network. A comprehensive MDM solution makes it easy to safeguard against threats, whether mobile devices are employee-owned or company-provided. MDM not only prevents unauthorized data access, it can also provide a number of benefits that reduce the risk of mobility threats, including:

• Require passcodes on all devices

• Require devices to auto-lock after a set time period

• Set passcode length and reuse restrictions

• Auto-lock or auto-wipe devices after a set number of failed log-in attempts

• Enforce browser security settings

• Locate lost mobile devices with geo-tracking

“Half of the workforce is expected to use smartphones by 2013.”

– IT World2

Mobile Device Management: A Real Need for the Mobile World LabTech Software

Page 5: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

3Mobile Device Management: More Than SecurityBesides the security aspects of MDM, IT service providers gain other benefits as well. By controlling and protecting the data and configuration settings for all mobile devices accessing the network, MDM can reduce support costs, business risks and client downtime. Other benefits include:

• Optimizes functionality of a mobile communications network

• Reduces stress on overloaded IT departments

• Costs less when incorporated into existing managed services plans vs. standalone MDM solutions

• Generates additional revenue for managed service providers and other IT service professionals

Plus, when policies are in place to ensure mobile devices are properly configured and secured before access to the corporate IT network is permitted, corporations are more likely to allow employee-owned devices inside the corporate firewall. As a result of the device management capabilities provided through MDM, employees are now empowered to choose the mobile device they prefer instead of being forced into particular brands or models by the IT department. Lastly, IT service providers can use MDM to manage the devices over-the-air with minimal interruption to employee schedules.

“It’s no longer a question of whether IT departments will support and embrace consumer-first devices, bring-your-own-device (BYOD) programs and the expanded sphere of mobile platforms – now, the issue is more about when and how.”

– Computerworld3

Mobile Device Management: A Real Need for the Mobile World LabTech Software

Page 6: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

4What to Look For In an MDM ToolShopping for the right MDM tool is easy when you know what to look for. When reviewing an MDM tool, look for one that integrates with your remote monitoring and management (RMM) solution and professional service automation software (PSA) to provide maximum efficiency and productivity.

LabTech Software, the developer of a powerful remote monitoring and management (RMM) platform, recently introduced MDM to serve the growing mobile market. LabTech MDM allows IT service providers to manage and secure Android™ and Apple iOS® mobile devices remotely, safely and efficiently throughout their entire lifecycle.

An MDM tool should also offer a comprehensive list of options, such as the ability to: • Safely enroll new or existing devices over-the-air (OTA)• Configure one or multiple devices to enforce company policies and procedures• Collect and analyze relevant hardware and software data, such as device type, model, serial number, memory and installed apps• Capture carrier network, phone number and data roaming settings• Secure client networks through safety policies and restrictions• Enforce restrictions, such as access to app stores, use of the camera and browser security• Define password complexity for unlocking devices, as well as the number of failed

login attempts before all data on the device is erased• Centrally manage all mobile devices across all customer sites from a single interface• Safely apply corporate settings, including Microsoft Exchange, Wi-Fi, VPN, LDAP, and configure and apply third party email such as POP and IMAP

• Pinpoint the physical location of a mobile device with geographical location lookup• Easily take a screenshot of a problem area and attach it to a support ticket for faster troubleshooting and support• Allow for data plan management, including alerting when activity spikes occur to avoid costly overage charges

Mobile Device Management: A Real Need for the Mobile World LabTech Software

Page 7: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

5Once you’ve embraced MDM, it’s time to sell the idea to your customers. Ask any IT service provider and they’ll tell you – selling the idea of MDM is extremely difficult. But it doesn’t have to be.

A major MDM challenge is placing a specific value on abstract benefits, such as improved customer service, more secure IT networks and regulatory compliance. Selling MDM is just a matter of validating the business benefits that will create greater ROI for the company. The best way to do this is to provide specific data or scenarios that make it difficult to deny the value of MDM.

Provide your customers with education and marketing assets that explain the risks associated with mobile device use in corporate environments. Provide specific use cases that they can relate to, such as a dentist who lost a tablet that wasn’t password protected and contained confidential patient files. Or the salesperson that left his smartphone at the coffee shop that contained a business application where he stored all of his confidential client contracts. Or the secretary who installed a malicious application that contained malware, which then spread through the company’s IT network via Exchange.

How to Sell MDM to Your Customers

MDM Pricing Best Practices

Pricing MDM varies depending on the needs of the client. The most popular pricing strategy among IT professionals is to add full MDM services to existing managed service contracts. There are a variety of possible pricing models within this approach, including:

Flat RateOne option to consider is charging a flat fee per mobile device. The average per device charge is $5, with some IT service providers charging as little as $2 per device and others charging up to

$10 per device.

Variable RateVariable pricing comes into play when IT professionals provide services to clients of varying sizes and in various industries. For instance, a client with only 10 mobile devices to support might be charged $10 per device, whereas a client with 100 or more mobile devices might be charged a lower $2-5 per device.

Primary Device RateSome IT professionals are finding that their clients are replacing laptops with tablets where practical, such as in sales environments where outside salespeople need the convenience of a tablet or in cases where a mobile device is needed primarily for looking at charts or doing data entry through terminal services in, for example, a physical therapy clinic. In these cases, when a tablet is the primary device, service providers are charging a premium of $25 or more per mobile device.

For clients who are not ready to pay a monthly fee for MDM services, it is suggested that MDM agents be pushed out to their employee and company-owned mobile devices at no charge. Then if a mobile device is lost or stolen, the IT professional can attempt to locate the device and/or perform a complete wipe of the device for a one-time per incident charge.

Mobile Device Management: A Real Need for the Mobile World LabTech Software

Page 8: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

6 It’s critical that IT service providers stay current on technological innovations. Consider an MDM solution that can easily adapt to a fluid landscape. Long-term success will require some degree of integration between MDM and the rest of your IT infrastructure and processes.

The Future of MDMThe mobile workforce is continuously changing. Each day, new opportunities pave the way for new technology (and vice versa). The mobile industry is constantly evolving to meet the growing needs of corporations – will you be ready?

Mobile Device Management: A Real Need for the Mobile World LabTech Software

Page 9: Mobile Device Management - Amazon S3 · 2014-07-29 · Mobile device management (MDM) is here to stay. A comprehensive MDM solution provides effective risk management, minimizes security

Mobiledevicemanagement(MDM)isheretostay.AcomprehensiveMDMsolutionprovideseffectiveriskmanagement,minimizessecuritythreats,ensurespolicycomplianceandregulatesemployeebehavior–withoutgettinginthewayofbusiness.AnMDMsolutionallowsuserstocontinueusingtheirdevicestoincreaseproductivityandefficiency,withoutworryingaboutsecuritythreats.NowisthetimetogetMDM–don’twaituntilit’stoolate.

Summary

About LabTech Software

1 Symantec. “The Symantec Smartphone Honey Stick Project.” 2012.

2 Linke, Rebecca. “Spotlight on mobile device management.” ITworld. 2012, September 28. http://www.itworld.com/mobile-wireless/299220/spotlight-mobile-device-management

3 Faas, Ryan. “Mobile device management – what you should know.” Computerworld. 2011, December 8.

LabTechSoftwareisthebrainchildofamanagedserviceprovider(MSP)thatstruggledwiththeusualchallengesandinefficienciesofareactiveITmaintenanceandsupportmodel.LabTech—itsflagshipsolution—wasbornoftheurgentneedtoeliminatetechnicianinefficienciesandthedesiretoprovidepreventiveandproactiveservice.Developedwithcutting-edge,agenttechnology,LabTechistheonlyremotemonitoringandmanagement(RMM)platformcreatedbysystemadministratorsforsystemadministratorstoautomateyourITservicesandeliminateinefficiencies.Formoreinformation,pleasevisitlabtechsoftware.comorcall877.522.8323.

4110 George Road, Suite 200 | Tampa, Florida 33634877.522.8323 | labtechsoftware.com