Tactical Advice

How to Keep Tabs on Mobile Devices

Mobile-device management applications can boost security efforts.
How to Keep Tabs on Mobile Devices

Mobile-device management (MDM) applications provide central management consoles that add a layer of security and control to mobile environments.

By using software agents downloaded to mobile devices, MDM applications help authorize whether a device is allowed to tap into the corporate network.

MDM programs can also scan devices for viruses when they log on to the network or download enterprise applications. They can also centrally set up e-mail and other types of business accounts.

In short, “MDM allows you to extend IT services into disconnected worlds,” says Mark Jordan, senior product manager for Afaria, an MDM solution from Sybase that supports multiple mobile-computing environments.

For example, Afaria can check to see which version of an operating system an individual device is running to make sure it’s current and conforms to the organization’s security policies. “So if you’re still running an outdated version of an operating system and that’s against the security mode, you won’t be allowed to access corporate e-mail,” Jordan says.

Similarly, Microsoft offers System Center Mobile Device Manager, server-based software that performs management and security services for mobile devices. It complements versions of Microsoft System Center designed to manage notebook systems.

When evaluating MDM applications, consider additional features that can do the following:

  • See the big picture: The best MDM consoles provide a central place where IT managers can monitor and manage all devices and applications under their control. This includes downloading software updates to devices while they’re in the field or disabling features, such as smartphone cameras, depending on corporate policies.
  • Protect data: Look for utilities that allow data to be backed up or wiped clean from a device if hardware is reported lost or stolen.
  • Scramble information: MDM programs should automatically encrypt sensitive data as it’s downloaded to devices to assure it stays secure when users roam outside corporate walls.
  • Accommodate growth: “Bring your own device” initiatives, and mobile implementations in general, are on a growth trajectory. Make sure a prospective MDM system can scale easily to handle from dozens to thousands of users.
Sign up for our e-newsletter

About the Author

Alan Joch

Alan Joch

Alan Joch has been an independent business and technology writer for more than a decade. His expertise includes server and desktop virtualization, cloud computing, emerging mobile applications, cybersecurity and green IT. Follow him on Twitter @alanallegro

Security

Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.