The latest tech newsbacked by expert insights
Stay up to date on the most important—and intriguing—industry trends on AIautomationdata and beyond with the Think newsletter. See the IBM Privacy Statement.
×
注意!页面内容来自https://www.ibm.com/think/topics/mobile-device-management,本站不储存任何内容,为了更好的阅读体验进行在线解析,若有广告出现,请及时反馈。若您觉得侵犯了您的利益,请通知我们进行删除,然后访问 原网页
Mobile device management (MDM) is a methodology and toolset that provides a workforce with mobile productivity tools and applications while keeping corporate data secure.
With a mature MDM platformIT and security departments can manage all of a company’s devicesregardless of their operating system. An effective MDM platform helps keep all devices secure while keeping the workforce flexible and productive.
Stay up to date on the most important—and intriguing—industry trends on AIautomationdata and beyond with the Think newsletter. See the IBM Privacy Statement.
In recent yearsmobile devices have become ubiquitous in enterprise use. Businesses and their workforces rely on mobile devices such as smartphonestablets and laptops for a wide assortment of tasks. And as working remotely has become essentialmobile devices have become an integral part of most organizationsbeing vital tools for productivity and efficiency.
But because enterprise mobile devices access critical business datathey can threaten security when hackedstolen or lost. Sothe importance of managing mobile devices has evolved such that IT and security leaders are now tasked to provisionmanage and secure mobile devices within their respective corporate environments.
According to IBM Institute for Business Value benchmarks50% of enterprise organizations are not consideringevaluatingpiloting or rolling out a comprehensive mobile device management solution. As a resulttheir mobile devicesalong with the associated data and applicationsare less secure than they should be.
A common question on the web is: “Is mobile device management a piece of software?” The short answer is “yes” and “no.” MDM is a solution that uses software as a component to provision mobile devices while protecting an organization’s assetssuch as data. Organizations practice MDM by applying softwareprocesses and security policies onto mobile devices and toward their use.
Beyond managing device inventory and provisioningMDM solutions protect the device’s applicationsdata and content. In this senseMDM and mobile security are similar.
HoweverMDM is a device-centric approachwhereas mobile security and unified endpoint management have evolved to a user-centric stance. In an MDM programemployees can receive a dedicated work devicesuch as laptops or smartphonesor have a personal device remotely enrolled. Personal devices receive role-based access to enterprise data and emaila secure VPNGPS trackingpassword-protected applications and other MDM software for optimal data security.
MDM software can then monitor the behaviors and business-critical data on enrolled devices. And with more sophisticated MDM solutionsmachine learning and AI can then analyze these data. These tools ensure that devices are kept safe from malware and other cyberthreats.
For examplea firm might assign a laptop or smartphone to a staff member or consultant that is preprogrammed with a data profileVPN and the other necessary software and applications. In this scenarioMDM offers the most control to the employer. With MDM toolsenterprises can trackmonitortroubleshoot and even wipe device data if there is a theftloss or a detected breach.
Sowhat are mobile device management policies? MDM policies answer questions about how organizations manage mobile devices and govern their use. To configure and publish their policies and processesenterprises ask questionssuch as:
Each device that an enterprise enrolls or issues can be configured to include GPS tracking and other programs. The programs allow an enterprise's IT professionals to monitorupdate and troubleshoot the device in real-time. They can also detect and report high-risk or noncompliant devices and even remotely lock or wipe a device when lost or stolen.
IT departments procuredeploymanage and support mobile devices for their workforce including troubleshooting device functionality. These departments ensure that each device comes with the needed operating systems and applications for their users—including applications for productivitysecurity and data protectionbackup and restoration.
Application security can involve app wrappingin which an IT administrator applies security or management features to an application. Thenthat application is redeployed as a containerized program. These security features can determine whether user authentication is required to open an app. These features also control whether data from the app can be copiedpastedor stored on the deviceas well as whether the user can share a file.
Secure mobile management requires strong identity and access management (IAM). IAM allows an enterprise to manage user identities associated with a device. Each user’s access within an organization can be fully regulated by using such features as single sign-on (SSO)multifactor authentication and role-based access.
Endpoint security encompasses all devices that access a corporate networkincluding wearablesInternet of Things (IoT) sensors and non-traditional mobile devices. Endpoint security can include standard network security tools such as antivirus software and network access control and incident responseURL filtering and cloud security.
Bring your own device (BYOD) means employees use their personal mobile devices for work instead of company-issued devices. Applying enterprise security to a personal mobile device is more challenging than simply providing such devices. But BYOD is popularespecially among younger workers. Organizations make this compromise to increase employee satisfaction and productivity. BYOD can also make the mobile workforce more affordable because it eliminates the need to purchase extra hardware.
Enterprise mobility management (EMM) describes a broader form of mobile device management. Going beyond the device itselfits user and its dataEMM encompasses application and endpoint management and BYOD. EMM solutions are highly scalable and with new AI-powered security featuresthese solutions can offer real-time insights and alerts about thousands of behaviors and activities coming in from multiple sources at once.
Unified endpoint management (UEM) represents the integration and evolution of MDM and EMM. It solves more challenges associated with IoTdesktop or other mobile device security. UEM solutions can help enterprises secure and control the entire IT environment and its endpointssuch as smartphonestabletslaptops and desktops. UEM solutions can also help secure their users’ personal and enterprise dataapps and content.
With an agile UEM systementerprises can choose scalable solutions based on their needs. These solutions can support a single operating system or various devices across different platformssuch as Apple iOS iPhoneAndroidMicrosoft WindowsmacOSand Chrome OS. Mature UEM solutions are powered by machine learning and AIwhich can help an enterprise’s IT department make quick security decision based on real-time data and analytics.
Whether a cloud-based or on-premises modelan MDM solutions should allow an organization to see endpointsusers and everything in between. A good mobile device management software solution will:
Here are three best practices to consider in selecting an MDM solution:
Be sure that the reporting and inventory tool consolidates all enrolled devices and associated information into easy-to-follow reports. Daily updates should be generated automatically without manual input.
Beyond the advantages of instant accessibility afforded by cloud MDMthere should not be associated fees or hardware to buyinstall or maintain. The platform should be automatically updated with new features at a company’s disposal.
The ability to search for anything and everything is key to a cloud-based solution. An organization should be able to access its devicesintegrationsreportsapps and secure documents easily.