Skip Links

Network World

Mobile Device Management Challenge

Round 1: The MDM Challenge

Industry Issues. Vendor Differentiators.

The mobile generation has arrived. And like it or not, employees want choice in the devices they carry, including consumer-class, personal devices that they’re bringing to work and using to access corporate resources. What do you do?

You could put your foot down and refuse to support any mobile network access device that isn’t a Windows laptop or a BlackBerry smart phone. Or you could face today’s challenge of provisioning, managing and securing multiple mobile operating systems head on. Fortunately, there are new and quickly maturing ways to get the control needed to protect your organization’s confidential data, upgrade software versions and keep you in compliance with industry-specific governance mandates.

We have brought together six leading suppliers of enterprise mobile device management (MDM) and security solutions to explain how their solutions make it possible to succeed at the thorny task of managing today’s many and varied mobile devices, applications and networks. Specifically, AirWatch, Good Technology, MobileIron, Sybase, Symantec and Zenprise explain how they solve mobility problems and where they excel, all in a handy guide that you can download here.

Download our challenge to the MDM industry and see how the vendors responded.

Download our challenge to the MDM industry and see how the vendors responded.

Network World MDM Challenge Series presented by
Robin Layland & Joanie Wexler

Round 2: Panel Discussions

Security Issues and What to Do About Them

Industry analyst Joanie Wexler joins John Herrema from Good Technology and Ahmed Datoo from Zenprise to identify the security issues that mobile devices introduce into the enterprise and what should be done about them. Panelists do a deep dive into encryption – at what layers is it needed and how do you get it? They also touch on “containerizing” mobile applications in today’s multi-OS mobile environments where inherent security mechanisms differ from platform to platform and release to release.

Liability in a ‘Bring-Your-Own-Device’ World

Jon Kuhn of Symantec, Ojas Rege of MobileIron and Joanie discuss mobile device ownership and the impact ownership has on liability. The discussion explains the various mix-and-match models as to who pays for devices and monthly service charges and explores both the expense management and the security implications of the whole ownership issue.

Challenges of Managing Mobile Applications

Mark Jordan of Sybase, an SAP company, and John Marshall of AirWatch join Joanie to explore how to control the growing number of mobile apps. They discuss what should be done when employees intermingle business and consumer apps on their devices, for example, and the pros and cons of consumer- and enterprise-class app stores as vehicles for software distribution.

Empowering the Mobile Enterprise

AirWatch empowers enterprises to successfully manage mobile technology through an integrated solution for mobile security, mobile device management and mobile application management. AirWatch enables IT administrators to efficiently deploy, configure, secure, manage and support smartphones and tablets across multiple platforms. AirWatch reduces the cost and effort of deploying mobile devices and apps, increases IT efficiencies, improves employee productivity and mitigates risk associated with mobility. Enterprises can deploy AirWatch on premise, as a dedicated software appliance or a cloud-based Software as a Service (SaaS) model. Learn more.

Download now

When Mobile Device Management Isn't Enough

This paper will explore common methods of data loss that cannot be prevented through MDM alone. In addition, this paper will introduce Good for Enterprise—and its unique approach to managing security on mobile devices, which does address some of the shortcomings of an MDM-only strategy.

Download now

Building a Scalable Bring-Your-Own-Device Program: A MobileIron.com Whitepaper

Many organizations are considering personally-owned mobile devices for business apps. Their goal is to drive employee satisfaction and productivity through the use of new technologies, while simultaneously reducing mobile expenses. This paper discusses the bring-your-own-device (BYOD) trend. BYOD is one of the more dramatic results of the consumerization of IT, in which consumer preference, not corporate initiative, drives the adoption of technologies in the enterprise. However, many of these technologies were not built with enterprise requirements in mind, so IT teams often feel uncomfortable about security and supportability. Based on the experience of MobileIron customers, this paper outlines eight major components for successful BYOD strategies and best practices on how to implement the program.

Download now

Afaria: A Technical Overview

With so many mobile operating systems and device choices available, you need a solution that can manage and secure all your critical enterprise data, applications and devices. Afaria simplifies the management complexities of an on-the-go workforce by ensuring that all data stored and transmitted by mobile devices is secure.

Download now

A Window into Mobile Device Security: Examining the security approaches employed in Apple’s iOS and Google’s Android

This whitepaper conducts an in-depth, technical evaluation of the two predominant mobile platforms, Apple’s iOS and Google’s Android, in an effort to help corporations understand the security risks of deploying these devices in the enterprise.

Chief among the findings is that while the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets that regularly find their way onto devices. Complicating matters, today’s mobile devices are increasingly being connected to and synchronized with an entire ecosystem of 3rd-party cloud and desktop-based services outside the enterprise’s control, potentially exposing key enterprise assets to increased risk.

The paper offers a detailed analysis of the security models employed by Apple’s iOS and Google’s Android platforms, evaluating each platform’s effectiveness against today’s major threats, including:
• Web-based and network-based attacks
• Malware
• Social engineering attacks
• Resource and service availability abuse
• Malicious and unintentional data loss
• Attacks on the integrity of the device’s data

Download now

Your Enterprise is Upwardly Mobile, But Can Your Audit Committee Breathe a Sigh of Relief?

Zenprise, the leader in secure mobile device management, delivers the realtime defense enterprises need to capture the business opportunities that mobile business brings while safeguarding corporate IP, customer and employee data, non-public financial information, and business intelligence. With cloudbased and on-premise offerings, Zenprise lets your IT professionals secure and manage the most comprehensive array of mobile devices, gain visibility into and control over mobile apps, and shield the corporate network from mobile threats.

Download now