Case Studies

Businesses Stay Secure with MDM Software

MDM offers IT leaders peace of mind as they roll out mobile devices and sort out BYOD policies.
Businesses Stay Secure with MDM Software

Top executives, business development managers and senior underwriters for Frederick Mutual Insurance in Frederick, Md., receive at least one mobile device from the company, and some even have two. 

As a full-service provider of business insurance to carpenters, electricians and other skilled trade workers, the company also wants to be able to provide network access to a cadre of third-party claims adjusters in the aftermath of significant weather events.

CIO David Pitzer says the expanded requirement for mobile network access in the field — supported by his company’s lean four-person IT staff — led him to subscribe to Fiberlink’s MaaS360 cloud-based mobile device management (MDM) software.

“It doesn’t make sense to bring a lot of hardware in-house,” Pitzer says, noting that cloud services provide business continuity during weather events. “It really made a difference for us last year during the derecho that hit the East Coast.”

45 minutes

Amount of time it took Frederick Mutual Insurance to get up and running on Fiberlink MaaS360

Pitzer appreciates the platform’s straightforward management. The MaaS360 MDM service lets him easily enforce security capabilities such as disk encryption, password security and Wi-Fi settings, plus add the software employees need.

“I just email the users a link and they log on, approve the software and access some of our internal systems,” Pitzer explains. “It’s a powerful tool that lets us scale up quickly.”

Chris Silva, an Altimeter Group analyst who focuses on mobility, says MDM software provides a good first step for many organizations, especially those that have small IT staffs.

“MDM software gives companies the functional ability to manage the device, but the future leaders in this space will have a more nuanced approach centered around managing not just the device, but also data and applications,” says Silva. “As companies move toward BYOD, devices will come and go, and CIOs will focus more on applications.”

Banking on MDM

Needham Bank in Needham, Mass., also deployed MDM to keep its top executives and vice presidents in sync with the mobility trend.

Roughly 80 of the bank’s 150 employees have an iPad or iPhone, and the directors in particular need access to the corporate portal. James Gordon, first vice president of IT for Needham Bank, says, “Everyone wants an ‘i’ device, so we had to find a way to make them secure.”

Gordon selected an in-house version of MobileIron’s MDM solution, which runs as a virtual server and is easy to upgrade and manage.

While Needham Bank started off blocking Apple’s iCloud because of concerns about managing data in the cloud, Gordon says MobileIron software now allows him to encrypt data, applications and email attachments. “I can now allow iCloud because once I encrypt a file, it stays secure no matter where it goes,” he explains.

Sign up for our e-newsletter

About the Author

Steve Zurier

Steve has more than 30 years of journalism and publishing experience, most of the last 20 of which were spent covering technology. He has covered networking and telecommunications in corporate computing, government and small business environments.

Follow him on Google+ and Twitter:


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.