×

注意!页面内容来自https://www.ibm.com/think/topics/mobile-device-management,本站不储存任何内容,为了更好的阅读体验进行在线解析,若有广告出现,请及时反馈。若您觉得侵犯了您的利益,请通知我们进行删除,然后访问 原网页

What is mobile device management (MDM)?

What is MDM?

Mobile device management (MDM) is a methodology and toolset that provides a workforce with mobile productivity tools and applications while keeping corporate data secure.

With a mature MDM platformIT and security departments can manage all of a company’s devicesregardless of their operating system. An effective MDM platform helps keep all devices secure while keeping the workforce flexible and productive.

Why mobile device management is important

In recent yearsmobile devices have become ubiquitous in enterprise use. Businesses and their workforces rely on mobile devices such as smartphonestablets and laptops for a wide assortment of tasks. And as working remotely has become essentialmobile devices have become an integral part of most organizationsbeing vital tools for productivity and efficiency.

But because enterprise mobile devices access critical business datathey can threaten security when hackedstolen or lost. Sothe importance of managing mobile devices has evolved such that IT and security leaders are now tasked to provisionmanage and secure mobile devices within their respective corporate environments.

According to IBM Institute for Business Value benchmarks50% of enterprise organizations are not consideringevaluatingpiloting or rolling out a comprehensive mobile device management solution. As a resulttheir mobile devicesalong with the associated data and applicationsare less secure than they should be.

IBM MaaS360

What is Maas360?

See how modern organizations protect devicesappsand data while keeping employees productive. This short video explains the challenges of mobile management and how they can be solved.

How mobile device management works

A common question on the web is: “Is mobile device management a piece of software?” The short answer is “yes” and “no.” MDM is a solution that uses software as a component to provision mobile devices while protecting an organization’s assetssuch as data. Organizations practice MDM by applying softwareprocesses and security policies onto mobile devices and toward their use.

Beyond managing device inventory and provisioningMDM solutions protect the device’s applicationsdata and content. In this senseMDM and mobile security are similar.

HoweverMDM is a device-centric approachwhereas mobile security and unified endpoint management have evolved to a user-centric stance. In an MDM programemployees can receive a dedicated work devicesuch as laptops or smartphonesor have a personal device remotely enrolled. Personal devices receive role-based access to enterprise data and emaila secure VPNGPS trackingpassword-protected applications and other MDM software for optimal data security.

MDM software can then monitor the behaviors and business-critical data on enrolled devices. And with more sophisticated MDM solutionsmachine learning and AI can then analyze these data. These tools ensure that devices are kept safe from malware and other cyberthreats.

For examplea firm might assign a laptop or smartphone to a staff member or consultant that is preprogrammed with a data profileVPN and the other necessary software and applications. In this scenarioMDM offers the most control to the employer. With MDM toolsenterprises can trackmonitortroubleshoot and even wipe device data if there is a theftloss or a detected breach.

Sowhat are mobile device management policies? MDM policies answer questions about how organizations manage mobile devices and govern their use. To configure and publish their policies and processesenterprises ask questionssuch as:

  • Do devices need passcode protection?
  • Should cameras be disabled by default?
  • Is wifi connectivity important?
  • What customization options will the device provide?
  • Do certain devices need to be geo-fenced?

Components of mobile device management tools

Device tracking

Each device that an enterprise enrolls or issues can be configured to include GPS tracking and other programs. The programs allow an enterprise's IT professionals to monitorupdate and troubleshoot the device in real-time. They can also detect and report high-risk or noncompliant devices and even remotely lock or wipe a device when lost or stolen.

Mobile management

IT departments procuredeploymanage and support mobile devices for their workforce including troubleshooting device functionality. These departments ensure that each device comes with the needed operating systems and applications for their users—including applications for productivitysecurity and data protectionbackup and restoration.

Application security

Application security can involve app wrappingin which an IT administrator applies security or management features to an application. Thenthat application is redeployed as a containerized program. These security features can determine whether user authentication is required to open an app. These features also control whether data from the app can be copiedpastedor stored on the deviceas well as whether the user can share a file.

Identity and access management (IAM)

Secure mobile management requires strong identity and access management (IAM). IAM allows an enterprise to manage user identities associated with a device. Each user’s access within an organization can be fully regulated by using such features as single sign-on (SSO)multifactor authentication and role-based access.

Endpoint security

Endpoint security encompasses all devices that access a corporate networkincluding wearablesInternet of Things (IoT) sensors and non-traditional mobile devices. Endpoint security can include standard network security tools such as antivirus software and network access control and incident responseURL filtering and cloud security.

BYOD and mobile device management

Bring your own device

Bring your own device (BYOD) means employees use their personal mobile devices for work instead of company-issued devices. Applying enterprise security to a personal mobile device is more challenging than simply providing such devices. But BYOD is popularespecially among younger workers. Organizations make this compromise to increase employee satisfaction and productivity. BYOD can also make the mobile workforce more affordable because it eliminates the need to purchase extra hardware.

Enterprise mobility management

Enterprise mobility management (EMM) describes a broader form of mobile device management. Going beyond the device itselfits user and its dataEMM encompasses application and endpoint management and BYOD. EMM solutions are highly scalable and with new AI-powered security featuresthese solutions can offer real-time insights and alerts about thousands of behaviors and activities coming in from multiple sources at once.

Unified endpoint management

Unified endpoint management (UEM) represents the integration and evolution of MDM and EMM. It solves more challenges associated with IoTdesktop or other mobile device security. UEM solutions can help enterprises secure and control the entire IT environment and its endpointssuch as smartphonestabletslaptops and desktops. UEM solutions can also help secure their users’ personal and enterprise dataapps and content.

With an agile UEM systementerprises can choose scalable solutions based on their needs. These solutions can support a single operating system or various devices across different platformssuch as Apple iOS iPhoneAndroidMicrosoft WindowsmacOSand Chrome OS. Mature UEM solutions are powered by machine learning and AIwhich can help an enterprise’s IT department make quick security decision based on real-time data and analytics.

Mobile device management best practices

Whether a cloud-based or on-premises modelan MDM solutions should allow an organization to see endpointsusers and everything in between. A good mobile device management software solution will:

  • Save time
  • Improve efficiency
  • Increase production
  • Increase security
  • Ease of overall mobile management system

Here are three best practices to consider in selecting an MDM solution:

Automated reports

Be sure that the reporting and inventory tool consolidates all enrolled devices and associated information into easy-to-follow reports. Daily updates should be generated automatically without manual input.

Automatic updates

Beyond the advantages of instant accessibility afforded by cloud MDMthere should not be associated fees or hardware to buyinstall or maintain. The platform should be automatically updated with new features at a company’s disposal.

Easy search

The ability to search for anything and everything is key to a cloud-based solution. An organization should be able to access its devicesintegrationsreportsapps and secure documents easily.

Related solutions
IBM MaaS360

Manage and protect your mobile workforce with AI-driven unified endpoint management (UEM).

Explore MaaS360
Enterprise security solutions

Transform your security program with solutions from the largest enterprise security provider.

Explore cybersecurity solutions
Endpoint security management services

Protect your enterprise endpoints from cybersecurity threats with our managed endpoint security services.

Explore XDR services
Take the next step

Discover how to stop mobile security threats with enterprise mobile security solutions that enable flexible delivery of appscontent and resources across devices.

  1. Explore mobile security solutions
  2. Book a live demo