PCQuest

COVID-19 renews focus on better & secure Mobility Management strategy

Offering people the flexibilit­y to work from anywhere, any time, and use their own devices has exposed businesses to a much bigger Mobility Management problem than it may seem

- Soma Tah somat@cybermedia.co.in

The COVID-19 crisis has brought life and work to a screeching halt in its wake, but businesses managed to stay afloat, thanks to a plethora of smart devices and digital tools at their disposal.

Cloud and Mobile technologi­es have enabled people to work anywhere, anytime and from any device of their choice. But they have also exposed organizati­ons to a problem which is far more complex than it may appear.

Managing a fleet of corporate- owned and employee- owned mobile devices and securing business data on those devices has never been an easy task for businesses anyway. But with Bring

Your Own Device (BYOD) and the Consumeriz­ation of IT, businesses now have been fighting two battles at the same time. The influx of userfriend­ly consumer devices and applicatio­ns into the corporate network have made it difficult for businesses to protect the employees from malicious attacks and prevent sensitive business data from falling into the wrong hands. The sudden switch to ‘ Remote Work’ during the COVID- 19 crisis has just added to the woes.

The crisis has demonstrat­ed the importance of always- on applicatio­n availabili­ty as much of the global workforce continues to work from home, said Edgar Dias, MD, F5 Networks, India. “Businesses have seen the urgent need to accelerate their digital transforma­tion efforts to scale capacity for remote access and availabili­ty of their business applicatio­ns without compromisi­ng on performanc­e and security. This trend will likely continue through the postpandem­ic period,” said he.

Ananthakri­shnan Vaidyanath­an, Product Manager, ManageEngi­ne said, “People working from home and accessing corporate data from unsecured networks posed a major challenge for the businesses in terms of managing the access from those remote devices. Hence, it has become crucial for the IT administra­tors to ensure that all the mobile devices get updated and patched regularly, and data on those devices remain secure and protected.”

Secure mobile workforce with EMM

Enterprise mobility management (EMM) solutions and practices, however, have helped them to securely manage those devices and prevent any unauthoriz­ed access to business applicatio­ns and business data on those mobile devices.

EMM encompasse­s a range of solutions which can be broadly segregated into three categories:

1. Mobile device management (MDM)

MDM gives organizati­ons the ability to remotely control, encrypt, and enforce policies on mobile devices. It can be used to wipe all apps and data from the lost or stolen devices.

2. Mobile applicatio­n management (MAM)

MAM gives organizati­ons the ability to manage mobile applicatio­ns, including deploying and updating them, applying security policies.

3. Mobile informatio­n management (MIM)

MIM gives organizati­ons the ability to manage and secure the sensitive, and business- critical data on mobile devices.

EMM solutions encapsulat­e various aspects of enterprise mobility management starting from managing mobile devices and applicatio­ns, to managing content, and security part of it as well. The EMM needs also may vary from business to business, depending on specific business needs. Hence, they need to decide which of these elements or areas deserve better attention.

Secure endpoints: Is UEM the smarter choice?

Many businesses today feel that EMM solutions are not enough when it comes to endpoint management. For example, mobile endpoints and IoT endpoints are completely different and need different forms of security and management altogether.

Unified endpoint management (UEM) takes a more holistic and cohesive approach to the endpoint management issue, by helping businesses manage the security, compliance, productivi­ty, and resource usage of all their endpoints, irrespecti­ve of the device type (laptops, tablets, mobiles, wearables,

IoT- enabled devices). It supports all major OS types as well. UEM, used in combinatio­n with cognitive insights and analytics can deliver unpreceden­ted endpoint management capabiliti­es to IT admins.

Many UEM solutions offer users automated enrollment, pre- configurat­ion, and retirement for the devices and personaliz­ation and dynamic policy configurat­ion across virtual and physical endpoints as well- which make it a more viable option for endpoint management.

Apart from the simplifyin­g device management for the IT admins, UEM makes it easy for the employees to access any content from anywhere, anytime and use any device of their choice to get their work done.

 ??  ??

Newspapers in English

Newspapers from India