The Meridian Blog: Tech News, Tips & More for SMB and Enterprise Environments

The 4 Corners of a Mobile Device Management Security Framework

Robert Bruce

Posted by Robert Bruce
Tue, Dec 24, 2013


Managed services and solutions for mobile device management (MDM) have evolved far beyond basic lock and wipe capabilities. Enterprises facing mobility management challenges require a system built on a secure foundation. A comprehensive mobile security framework stands on four key enterprise mobility points: devices, apps, data, and the network. 

1) The Mobile Devices

Naturally, MDM starts with the devices, both user-owned (BYOD) and organization-issued. The key question for IT service support personnel is whether or not they can monitor, control, and protect a wide range of mobile devices. Laptops, tablets, and smart phones with an array of operating systems have become essential to the modern enterprise, and they present unique new challenges.

Mobile IT security begins with visibility into all the devices connected to the network. Everything connected should be identified and categorized using several data points starting with, but not limited to MAC and IP addresses. Devices should be audited on a regular basis for ownership (BYOD or corporate), operating systems, installed apps, and location, i.e. roaming or stationary. Also, they should have the latest anti-virus and anti-malware software installed.

Devices should be centrally configured for pass codes and encryption to detect and block non-compliant devices, and any devices out of compliance should be blocked from network access. Policies should be in place to promptly report lost or stolen devices, and they should be wiped and locked from the managed network. This also applies to devices whose users leave the organization.

2) The Apps

mobile apps

We love our apps. In fact, we couldn’t work without them. Access to e-mail, the Internet and our documents is essential, but keeping them secure is a headache for IT departments. Apps are diverse and many don’t share the same security frameworks. Inventory here is essential. Identify all installed apps and check for compliance with privacy and access policies as well as connectivity and data controls.

Depending on the enterprise’s mobility requirements, organizations must provide a plethora of mobile, web, SaaS (software-as-a-service), Windows and data center apps. Some managed IT solutions have included enterprise-unified app stores, where all of these apps are available to qualified users in one place. The IT challenge is to secure custom and third-party apps centrally, and apply policy controls. Users must also be denied access to apps and data after departing the organization.

3) Mobile Data Security

File sharing across multiple devices has become essential to many enterprises. This has enhanced efficiency, allowing users to access the latest data anywhere, anytime. Unfortunately, this has led to more data leakage events, malware outbreaks, and system compromises. Encrypting data and controlling access to data sharing apps, while allowing users to benefit from them, is a huge enterprise IT challenge.

User friendly, cloud-based storage tools, such as Dropbox and Google Drive, have become increasingly popular, but present enterprises with data security challenges. Hence, many IT solutions for mobile data security have abandoned the one-size-fits-all approach and adopted a tiered system, providing full-stack data access only to those employees with a "need to know." Other workers may only have access to a few task-specific apps.

All mobile data should be encrypted while at rest and in transit. Data leakage can be minimized with secure, encrypted data storage containers. Naturally, the data should be wiped upon user departure or device loss.

4) The Network

Any MDM solution must address network security. Certainly, protecting the enterprise network from viruses and malware delivered via the mobile route is a top priority. IT managers must continuously monitor and control network access, based on device status and user profile.

MDM solutions must be enterprise-grade, capable of keeping sensitive information protected behind a firewall and not exposed to the Internet. MDM solutions should be able to easily integrate with the existing IT infrastructure and allow room for future expansion. Managing increased bandwidth needs is another IT mobility challenge.

Perhaps, the last, but certainly not least ingredient in the MDM recipe is the user. All of us are benefiting from these new devices as the enterprise environment continues to evolve.

Click here to request an assessment of your entire technology environment, including devices, apps, security, network and users. Meridian's unique, holistic approach to managed IT services offers ensures peace of mind and allows you to focus on core competencies.

Ready to get started? A thorough assessment of your technology environment and business processes can improve system reliability, streamline business processes, and improve focus on core competencies. Click here to request an assessment.

Robert Bruce

Ready to Become a Pro?

 Our White Paper can help.

whitepaper-4-key-elements-for-building-your-technology-road-map-thumbnail-3Subscribe to our blog and get your copy of "4 Key Elements to Consider When Building Your Technology Road Map"

You'll learn:

  • What role people play in determining your road map
  • How to build a plan in a multi-device world
  • What types of applications need to be considered
  • How data plays a key role in success

 

Subscribe to get your copy

Leave A Comment

About this blog

News, best practices and more to help you get the most out of your office technology. Whether you're an SMB owner who wears a lot of hats, or an enterprise IT director, facilities manager or just someone who wants to work smarter — this blog has the resources you need to maximize the business impact of all your tech investments. Be sure to subscribe to receive email updates about new posts!

Download our eBook

 
DM_Workbook_Cover_Page.jpg

Download

Sort Posts by Topic

see all