Mobile Device Management, Now More Than Ever


It doesn't take a world-class debater to convince folks that mobile device management is growing in importance. Mobile devices are becoming more powerful, the tasks they are used for increasingly are mission-critical and the data stored on them more valuable.

Processor lays out some of the most important points about mobile device management. The first step-and one that an analyst quoted in the piece says pays big dividends even if it also is the last step-is asset management. As the name implies, this is simply figuring out what devices are being used by whom and where they are. Another excellent point, raised by another analyst, is that some functions-such remote wiping and data synchronization-are completely new. Antivirus and other security steps, conversely, are customized versions of tools that exist elsewhere in the enterprise. The key elements of mobile device management, the story says, include remote asset management, security, software distribution, data synchronization and efficient help desks.

Mobile device management and security are separate but intricately linked issues. Increasingly, IT departments must pay attention the way in which mobile users under their care use their devices to access the Internet. Mobile browsers differ, according to this Industry Standard story, in their inherent level of security. The piece offers some insight into what the differences are. IT departments, the writer notes, must focus on the security elements of the browser itself, training users to browse safely and creating what the writer refers to as "a solid handheld device management system." Several elements of an adequate management system are offered towards the end of the piece.

There is news on the mobile device management front:

The close relationship between mobile device management and security is illustrated by this Science News live posting. In one paragraph, the poster extols the importance of the software and suggests that good products support a number of devices and operating systems. In the very next paragraph, the writer provides six levels of security that such products should offer: encryption, password protection, centralized management, remote wiping, firewall/antivirus and policy enforcement.

Though mobile device management and mobile security are deeply linked, the sector goes beyond the protecting devices and data. Companies need to pay close attention to these software packages because they can reduce costs and make mobile workers more efficient.