Mobile Device Management

TEMIA: BYOD Dos and Donts

Issue link: https://resources.motus.com/i/1177514

Contents of this Issue

Navigation

Page 8 of 12

Copyright © 2013 TEMIA P a g e | 8 www.temia.org Employers may also wish to consider a system that provides real-time monitoring and alerts to employees and telecom managers when consumption of a data or voice plan is close to its monthly allotment. Another feature for international travelers provides real- time capabilities to manage international roaming charges. Finally, look for reporting that can identify when new devices are provisioned, apps which do not comply with corporate guidelines and devices that have not checked in after an extended period of time. Security Like PCs, smartphones and tablets and the data that resides on those devices must be protected. There are several areas of vulnerability. First there is vulnerability from the physical loss of equipment, when an employee leaves it somewhere or it is stolen. The second security risk includes spyware, malware and viruses. This can result in a network of devices programmed for malicious activity such as stealing data (customer credit cards, patient records etc.) or crashing a corporate network. Device manufacturers support encryption, but the encryption levels vary. Some MDM providers have the ability to encrypt specific files, folders or company data. Also, providers can now place corporate data and applications in a secure environment or sandbox. Partitioning allows employees to separate work and personal items. Some MDM providers are offering browser security. Mobile web browsing can be filtered to lower the risk of attack on a device. Web filtering tools can block access to potentially dangerous or non-work-related websites. Intrusion-prevention software tools can block network access for noncompliant devices. In addition, some security now helps screen devices for malicious apps. Applications There are some apps that every employee should have. Others must be banned. Application filtering with white lists and blacklists can control access to apps based on the device and operating system. Enterprises may want an application store for in-house custom apps and preferred apps; this can address delays in Apple and Google's approval processes. There may also be reasons to avoid releasing an app in a public app store that competitors can view. MDM support for installing custom apps and establishing a company app store experience may be another important consideration. Policy Enforcement Before managers update their mobile policies, it is necessary to learn the ways which employees at different locations or divisions are circumventing the program. An enforceable policy can help secure corporate data on personal devices. This may require a policy to lock devices after several failed attempts at a password and a "kill switch" that can remotely wipe the data if a device is lost. Some MDM solutions provide data monitoring capabilities that report on what data is moving to and from the device. Location capabilities with "Geofencing," can detect when devices leave certain geographic areas and take action to secure them (such as locking or remotely wiping data on the device). In some cases, employers may wish to lock a camera when employees are in the office or other locations and release it for personal use when they are home. It should be noted that privacy laws add complexity for firms in some countries with laws that prohibit location tracking and use of these features.

Articles in this issue

Links on this page

Archives of this issue

view archives of Mobile Device Management - TEMIA: BYOD Dos and Donts