Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

From the security manager's journal: Time for a mobile-security upgrade

The world of mobile device security has moved on over the past couple of years to more of an overall remote management capability, of which security is just a part

Article comments

I've been looking into updating my mobile device security. Smartphones and tablets have been flooding into my company faster than I anticipated, eating up all my available licenses. That means I need to either reinvest in my current product or switch to something new.

I wrote about my experience in deciding on a mobile-device security product a couple of years ago. A lot has changed since then. The product I selected was, at the time, the best technology available: in the leading quadrant of the Gartner analysis of the mobile-device protection market. The security method it employs is called "containerisation," which basically means that all corporate data is contained within the security application instead of inside the native email, contacts and calendar apps. That's great for security, but it's not so popular with my users, whose reactions have ranged from disgruntled tolerance to outright hostility. Nobody likes it except me.

And that being the case, I like it less than I did. I believe security can (and should) make people's lives easier, if at all possible. And in the case of mobile security, it is possible. Several new mobile-device management products have emerged over the last year or two. Most of them support the native applications that people know and love, which means they don't interfere with the user experience. That makes security more transparent - in fact, it's practically invisible (after a one-time enrollment process). On top of that, the newer products cost a fraction of what I'm paying for my current deployment.

The world of mobile device security has moved on over the past couple of years to more of an overall remote management capability, of which security is just a part. Instead of buying security software for our mobile devices, we can focus instead on a device management platform that can enforce device policies like passwords and encryption and provide a selective remote-wipe capability for deprovisioning.

Another big change is the emergence of the cloud. The products I'm looking at now have cloud-based options (or software as a service, if you prefer), that simplify deployment. Instead of building servers, making them highly available and distributing them across my enterprise, I can get up and running within a day by leveraging the services available over the Internet. That gets me to my goal more quickly. I'm not sure how I feel about putting my data in someone else's hands, though. It's a difficult trade-off. On the one hand, there's good reason to retain control over my technologies. On the other hand, my practically non-existent staffing makes me feel the appeal of leaving the engineering, operation and maintenance of the service in the hands of the service provider.

Whether I decide to go on-premise or in the cloud, I'm definitely leaning toward the modern MDM approach. So, having confronted the prospect of a growing number of mobile devices in my security plan, I'm probably going to be able to improve the end-user experience and save the company money. That sounds like a win-win-win.

This week's journal is written by a real security manager, "J.F. Rice," whose name and employer have been disguised for obvious reasons. Contact him at jf.rice@engineer.com.


Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *