You may be worried that you’ll need a new solution to implement the first three best practices. That isn’t necessarily the case. If you have a BlackBerry Enterprise Server, then you are covered on that platform. And with Exchange or Lotus Notes, you can enforce your PIN policy and remote wipe your iPhones, iPad®s, and Windows Mobile devices. (Android™ added this Exchange-based security control in version 2.2.)
Following the three principles MaaS360 has already outlined is a responsible approach that takes advantage of existing infrastructure for device and risk management. And it’s a smart one considering that you really can’t stop people in your environment from using mobile devices.
The biggest issue with this approach is that reporting is limited and not scalable — you’ll need to develop and run reports manually, and deal with the lack of a centralized view into all devices.
But taking the first step with reporting and inventorying can dramatically improve your current posture on the uber-popular iPhone and Android devices. Then you can plan a more scalable and robust management and security solution (as described in the next best practices).