Enterprise mobility management

Last updated

Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing mobile devices, wireless networks, and other mobile computing services in a business context. As more workers have bought smartphone and tablet computing devices and have sought support for using these devices in the workplace, EMM has become increasingly significant.

Contents

The goal of EMM is to determine if and how available mobile IT should be integrated with work processes and objectives, and how to support workers when they are using these devices in the workplace. [1]

Business use of consumer mobile technology

[1] A 2012 study showed that about two-thirds of smartphone owners used their personal devices for enterprise-related activities. [2] Supporting a wide variety of device types and operating systems can introduce security risks and added costs for businesses. [3] [4]

A 2011 survey showed that three quarters of U.K. and U.S. CIOs surveyed considered mobile technology to be a significant security problem, although consumers were generally less concerned. [5]

Security

Because mobile devices are easily lost or stolen, data on those devices is vulnerable. Enterprise mobility management is a set of systems intended to prevent unauthorized access to enterprise applications and/or corporate data on mobile devices. These can include password protection, encryption and/or remote wipe technology, which allows an administrator to delete all data from a misplaced device. With many systems, security policies can be centrally managed and enforced. Such device management systems are programmed to support and cooperate with the application programming interfaces (APIs) from various device makers to increase security compliance. [6]

The data transfer between mobile device and the enterprise should always be encrypted, for example through a VPN tunnel [7] or over HTTPS. [8]

Mobile devices in companies with "bring your own device" (BYOD) policies are often used both personally and professionally. In these cases, corporate IT has less control over whether malware is on the device and what damage may be caused to corporate data. Apart from careful user behavior - data storage on the mobile device should be limited and centrally organized.[ citation needed ]

The diversity of Android devices appeals to consumer buyers, but is a source of anxiety for IT security experts. OpenSignal, a UK-based mobile company, recently published a survey of almost 700,000 devices and reported approximately 12,000 distinct Android devices using eight different versions of the Google operating system. For many IT organizations charting out their BYOD strategy, this translates into security risks that are tough to monitor and control. [9]

See also

Notes

  1. 1 2 Kietzmann, J.; Plangger, K.; Eaton, B.; Heilgenberg, K.; Pitt, L.; Berthon, P. (2013). "Mobility at work: A typology of mobile communities of practice and contextual ambidexterity" (PDF). Journal of Strategic Information Systems. 3 (4). doi:10.1016/j.jsis.2013.03.003. S2CID   3714450. Archived from the original (PDF) on 10 November 2013. Retrieved 9 November 2013.
  2. Ellis, Lisa; Jeffrey Saret & Peter Weed (2012). "BYOD: From company-issued to employee-owned devices" (PDF). Telecom, Media & High Tech Extranet: No. 20 Recall. Retrieved 15 May 2014.
  3. Drake, Stephen (October 2008). "Embracing Next Generation Mobile Platforms to Solve Business Problems" (PDF). Computerworld Inc. IDC. Archived from the original (PDF) on October 12, 2012. Retrieved 24 August 2011.
  4. Penfold, Andy (June 2011). "Sybase Warns Enterprise Over Mobile Security". Mobile Marketing. Dot Media Ltd. Archived from the original on 19 August 2011. Retrieved 24 August 2011.
  5. Rashid, Fahmida Y. (9 March 2011). "Mobile Security a Headache for CIOs, Not a Concern for Users". eWeek. Ziff Davis Enterprise Holdings Inc. Retrieved 24 August 2011.[ permanent dead link ]
  6. Cox, John (14 February 2011). "Samsung's 90 New APIs Boost Mobile Device Management, Security". Network World. Archived from the original on 18 September 2011. Retrieved 24 August 2011.
  7. Patrick Oliver Graf, 4 Essentials For Mobile Device VPNs. InformationWeek, 2014-10-31. Retrieved February 16, 2015.
  8. Kimberly Palmer, 10 Ways to keep your phone safe. U.S.News Money, 2015-1-13. Retrieved February 16, 2015.
  9. "The Missing IT Puzzle Piece for BYOD Mobility". CitizenTekk. 2013-09-18. Retrieved 2016-10-10.

Related Research Articles

An application server is a server that hosts applications or software that delivers a business application through a communication protocol. For a typical web application, the application server sits behind the web servers.

<span class="mw-page-title-main">BlackBerry Limited</span> Canadian technology company

BlackBerry Limited is a Canadian software company specializing in cybersecurity. Founded in 1984, it developed the BlackBerry brand of interactive pagers, smartphones and tablets. The company transitioned to providing software and services and holds critical software application patents.

<span class="mw-page-title-main">Mobile computing</span> Human–computer interaction in which a computer is expected to be transported during normal usage

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

Workspace is a term used in various branches of engineering and economic development.

Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices. Though closely related to Enterprise Mobility Management and Unified Endpoint Management, MDM differs slightly from both: unlike MDM, EMM includes mobile information management, BYOD, mobile application management and mobile content management, whereas UEM provides device management for endpoints like desktops, printers, IoT devices, and wearables as well.

Mobile Business Intelligence is defined as “Mobile BI is a system comprising both technical and organizational elements that present historical and/or real-time information to its users for analysis on mobile devices such as smartphones and tablets, to enable effective decision-making and management support, for the overall purpose of increasing firm performance.”. Business intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products and/or departments or associated costs and incomes.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

A mobile enterprise application platform (MEAP) is a suite of products and services that enable the development of mobile applications. The term was coined in a Gartner Magic Quadrant report in 2008 when they renamed their "multichannel access gateway market".

Hewlett Packard Enterprise Networking is the Networking Products division of Hewlett Packard Enterprise. HPE Networking and its predecessor entities have developed and sold networking products since 1979. Currently, it offers networking and switching products for small and medium sized businesses through its wholly owned subsidiary Aruba Networks. Prior to 2015, the entity within HP which offered networking products was called HP Networking.

Mobile application management (MAM) describes the software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings, on both company-provided and 'bring your own' mobile operating systems as used on smartphones and tablet computers.

A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on desktop computers, and web applications which run in mobile web browsers rather than directly on the mobile device.

Bring your own device —also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)—refers to being allowed to use one's personally owned device, rather than being required to use an officially provided device.

<span class="mw-page-title-main">Link Motion Inc</span>

Link Motion Inc, formerly NetQin and NQ Mobile, is a multinational technology company that develops, licenses, supports and sells software and services that focus on the smart ride business. Link Motion sells carputers for car businesses, consumer ride sharing services, as well as legacy mobile security, productivity and other related applications. Link Motion maintains dual headquarters in Dallas, Texas, United States and Beijing, China. A Court Receiver, lawyer Robert Seiden, was appointed over Link Motion in February 2019 in the United States in the federal district court in the Southern District of New York by Judge Victor Marrero. The Receiver removed Wenyong “Vincent” Shi as chairman and chief executive officer, and replaced him by appointing Mr. Lilin “Francis” Guo.

Samsung Knox is a proprietary security and management framework pre-installed on most Samsung mobile devices. Its primary purpose is to provide organizations with a toolset for managing work devices, such as employee mobile phones or interactive kiosks. Samsung Galaxy hardware, as well as software such as Secure Folder and Samsung Wallet, make use of the Knox framework.

Enterproid is an enterprise mobility management software company that helps business customers manage employee-owned smartphones and tablets, a trend known as Bring Your Own Device (BYOD). Enterproid is best known for its dual-persona platform called Divide, which separates iOS and Android devices into two personas for work and play.

A mobile workspace is a user's portable working environment that gives them access to the applications, files and services they need to do their job no matter where they are.

<span class="mw-page-title-main">Good Technology</span> American cybersecurity company

Good Technology, owned by BlackBerry Limited, is a mobile security provider headquartered in Sunnyvale, California, United States. The company serves more than 5,000 organizations worldwide in industries such as financial services, healthcare, manufacturing, energy and utilities, legal, government, and technology. Good makes products for managing and securing mobile devices in a business environment. The company focuses on securing apps and data on mobile devices.

MobileIron Inc. was an American software company that provided unified endpoint and enterprise mobility management (EMM) for mobile devices, such as multi-factor authentication (MFA). The company announced in September 2020 it was being acquired by Ivanti.

<span class="mw-page-title-main">MaaS 360</span> Unified endpoint management software

IBM MaaS360 is a SaaS Unified Endpoint Management (UEM) solution offered by IBM that manages and protects any existing endpoint including laptops, desktops, mobile devices and apps, wearables, IoT and purpose built devices and allow protected, low risk access to company resources. IBM Security MaaS360 with Watson integrates with current security platforms owned by different companies. It’s AI powered analytics removes friction by reducing actions required from the device user.

Unified endpoint management (UEM) is a class of software tools that provide a single management interface for mobile, PC and other devices. It is an evolution of, and replacement for, mobile device management (MDM) and enterprise mobility management (EMM) and client management tools.

References