MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Mobile Security Framework: The Mobile Device Management Foundation

Posted September 8, 2016by Rob Patey

Here’s a riddle: How does a mobile strategy turn from a gleaming skyscraper touching new heights of business productivity into a towering inferno? The answer: a poor mobile security foundation.


As the average mobile device gets more minuscule in the form of wearables and whatever technology comes next, many organizations need to go back to the basics of mobile security. That is one of the lessons Tyler Shields of Forrester Research recently shared in a mobile security video series.

Enterprise Mobility Management Needs to Start Somewhere

In an ideal world, a nefarious individual could steal a corporate tablet or smartphone and walk away without an ounce of sensitive data. However, we don’t live in that world. As Shields stated, “Mobile devices are interconnected; they connect back to corporate environments, they have data — important and sensitive data — saved on the device.”

While the mobile conversation should shift toward enterprise mobility management, which protects mobile data, apps, content and network file share access, this might be too much mobile mayhem for lean IT departments to manage out of the gate.

Mobile device management (MDM) is still the foundation that keeps those next steps aloft and stable. Or, it could be, since the right MDM system can easily scale mobile data, apps and content management in the same control panel.

 

Older Mobile Security Foundations Faltering

Some previously ironclad mobile device security solutions are starting to rust from a lack of updates or cumbersome installations. Those options are merely kept operating inside companies for fear of the dreaded migration downtime.

It’s a valid fear for IT and chief information security officers (CISOs), since their customers are looking at their mobile devices more than 200 times a day. Imagine a whole workforce paralyzed each time Apple, Google or Microsoft made an OS update. You don’t need to imagine it — with older MDM solutions, downtime is a deliverable versus an anomaly.
 

Real Mobile Device Management for Real Device Security

In the event of the inevitable mobile security ticket exclaiming, “Help, I lost my phone!” the following is what MSPs should seek for security surety in an MDM vendor:

One Window to Manage Every Mobile OS

It seems simple, but this is a big miss for many organizations. Even if you only prescribe to one OS for corporate-issued devices, bring-your-own-device (BYOD) happens regardless of whether the company sanctions it.

Mobile security, like all IT security, should bask in standardization. Cross-platform MDM ensures a CISO’s desire for eight-character alphanumeric password compliance is the same for iPhones and Androids alike.

Remote Locate, Lock, Block and Wipe

Just as you don’t need a flamethrower to kill a housefly, overly draconian responses to lost devices could obliterate the workforce’s fervor for mobile freedom. More often than not, mobile devices simply get lost. Wiping all the data of a device stuck between the couch cushions is simply unnecessary.

With MDM, you can use options on the Web to first see whether the device is truly gone. In a scenario in which a stranger may have accidentally grabbed the wrong phone, a simple lock and block will keep corporate secrets safe until an amiable exchange can be made. In the worst-case scenarios, in which the device and company data are at risk, the device can be wiped in a few seconds once the command is delivered.

Device Security Extras

If an organization needs a higher standard of secrecy or specialization, MDM options truly abound. Geofencing can shut off features from cameras to texts for areas of research and development secrecy. In retail and other shared device environments, kiosk mode can keep devices dedicated to a business-only app such as point-of-sale tools or catalogs.

Before you balk and say MDM or any device security isn’t for your MSP portfolio, it is important to remember that emails are corporate data, work files are often stored in Dropbox and the odds against losing a piece of work hardware grow exponentially as the technology shrinks in size.

Monetize Mobility with MDM

Continuum MDM powered by IBM MaaS360 is a seamless extension to their fully-integrated IT management platform. MaaS360 is a secure and comprehensive enterprise mobility management (EMM) platform that quickly deploys devices, delivers productivity apps and enables secure content collaboration on personal or corporate-owned mobile devices. In just a few quick clicks, MSPs can start enrolling devices and immediately manage the entire mobile lifecycle — from enrollment to enterprise integration, configuration and management, monitoring and security, support, and analytics and reporting.

IBM is sponsoring Continuum's upcoming user conference, Navigate 2016. Stop by the IBM booth at Navigate 2016 from September 28 – 30 in Boston to see a live demo of Continuum MDM and discuss tactics to monetize mobility in a BYOD era.

3-Mobile-Security-Quick-Tips-to-Share-with-Clients

 

 

I started 15 years ago trying to make B2B copy something people want to read versus something they have to read. Thanks to search and content marketing, I finally found a career and get to do what I love as Marketing Manager at IBM.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus