The Convergence of Mobile Device Management and Security

Michael Vizard
Slide Show

Smartphone Security Gaps

Employees are at risk for viruses and other security breaches, so IT staff need to be just as vigilant with company-issued phones accessing the network as they are with computers.

When it comes to mobile computing in the enterprise, we hear all the time that security is a major crisis waiting to happen. After all, no one can be quite sure where these devices have been online and the security apparatus surrounding them is still in its infancy.

In the meantime, IT organizations are being asked to manage fleets of these devices that all come from different manufacturers, which, in turn, only serves to exacerbate the security situation. That situation, of course, gets worse with the passing of every holiday as more end users decide to bring some new mobile computing device into the workplace.

Zenprise this week moved to close the mobile security gap with an update to its mobile device management service. According to Zenprise Chief Marketing Officer Ahmed Datoo, version 6.0 of MobileManager provides the ability to encrypt files, detect security threats and automate the responses to those threats, and limit access to certain enterprise applications.

The issue that many IT organizations are struggling with is how to efficiently manage smartphones and tablets in an age where end users are accessing websites and corporate files over not only telecommunications services, but also via any number of public Wi-Fi locations. This latter issue has become especially problematic because telecommunication providers are trying to push users of large files and video onto 802.11n wireless networks in order to minimize bandwidth consumption of 3G and 4G wireless networks.

In the Zenprise model, says Datoo, the company provides an "immune system on the client" that is augmented by additional security at the network and enterprise application levels.

It's clear that enterprise mobility isn't going to get simpler anytime soon, and when you think of all the things that an enterprise IT organization needs to do these days, babysitting mobile computing devices might not bring a high level of value to the organization as a whole. If that's the case, then maybe it's time to find a more efficient way to get the job done so that IT folks can go about adding real value to the business.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Add Comment      Leave a comment on this blog post
Dec 15, 2010 12:02 PM pragatichaplotjain pragatichaplotjain  says:

Agreed. Mobile device management needs to be more intelligent and not just cater to some basic needs -- enforcing a pass code, wiping a device if it gets lost, etc..

Here is a seminal read which dicussess some more MDM strategies: http://links.maas360.com/MDM_SmartPhones

Jun 27, 2011 1:42 PM Mario de Vries Mario de Vries  says:

Totally agree with the former posts. What you mean is enterprise managed mobility of which mobile device management is a part. Here's a blog about innovative mobile device management.


Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.