Mobile Device Management. Getting Started
Mobile Device Management. Getting Started
By Todd R. Weiss
FOLLOW
organization and that's not a good thing. Then it's being done without
control and security and that can have an impact potentially on the
company."
Centreville, Va.-based Carfax uses a blended approach, with some
workers using company-issued iPhones and iPads and others using
their own Android devices, says CIO Phil Matthews. "We allow other
employees to use a BYOD (bring-your-own-device) approach where it
works better for them or where they want to keep their device on their
personal mobile plan."
The company's 400 field workers use devices that are companyprovided or paid for through reimbursements. "We actually wanted
people to have a consistent experience, so we chose iPads and iPhones
as our main devices, but some people wanted Android devices" and are
allowed to use them, he says. Workers previously carried laptops and
printers along with BlackBerry devices, but productivity rose with the
iPads and iPhones, he explains. "Our sales reps can complete more
activities with the iPads and iPhones and we can provide them with
mobile applications that allow them to collaborate much more easily
than in the past."
Cora Carmody, the senior vice president of information technology at
Pasadena, Calif.-based Jacobs Engineering Group, says her company
looked at mobile devices from a different angle -- that of expense
management. As the recession took its toll, Jacobs continued to look
for ways to cut costs until finally the cellphone bills of some 45,000
workers became an enticing target, she says.
The company had acquired several other businesses and was bringing
in new users who all had different mobile vendors and devices, so the
IT group decided to look at it and find better ways of making it work.
Their answer was what Jacobs calls "wireless divestiture" -- in other
words, buying the devices for workers but then requiring workers to
pay their own monthly bills. Workers are given calling cards for travel
and can also expense extraordinary calls if needed, Carmody explains.
Jacobs has saved about $15 million annually since reorganizing its
mobile device strategy, Carmody says.
At first there was some grumbling about the new strategy, Carmody
admits. But the company met with mobile vendors to work out good
deals for employees when they signed up for new service contracts, so
because the financials were in their favor, employees started gradually
accepting the new arrangement over time.
"You can expect some complaints and backlash at the start," she says,
"You can expect some complaints and backlash at the start," she says,
"but we are also pleasantly surprised that some people recognized the
new choices that they had" in terms of different types of service
contracts -- "and appreciated that."
Jacobs worked up front with mobile vendors to obtain discounted
rates to allow employees to move to whichever carrier and plan fit
their usage and travel patterns best, according to Carmody.
"Previously employees were carrying two devices; one for Jacobs
support and one as their own personal device." By consolidating to one
device, employees' mobile situation has been simplified considerably.
Keeping company data safe
Security at Edelman includes requirements for passwords that are
secure as possible, Iatonna says. That means that all smartphones and
tablets must use passwords that are complex and include a minimum
number of characters, along with mandatory data encryption. After a
certain number of unsuccessful passwords are entered, the device
automatically resets and erases all data. This situation hasn't
happened yet, he says.
Another piece of advice, from Jacobs' Carmody: Be prepared to
confirm for users that any devices they are considering can meet both
the security and work needs of the business. "That gives people the
freedom to do what they want to do while protecting company
security," she says. "It's one of those building blocks for the idea of
bringing your own technology to work."
In general, the company allows Jacobs email to be viewed on personal
devices, while all other key corporate applications can be accessed only
via the Jacobs corporate portal. "This provides a high measure of
security for managing corporate data and eliminates the need to help
end-users manage data volumes on their personal devices," Carmody
explains. "We, of course, also employ stringent cybersecurity practices
that guard against access should a device be lost or stolen. Finally, we
have a robust process for reporting lost or stolen assets that ensure
immediate response to protect data in those situations."
At Carfax, access to corporate data is controlled through application
privileges and passwords; users have access to corporate data and
applications based on their job need and role in the company,
Matthews said.
Remote-wiping policies
One lesson has become very clear, according to Matthews. "Don't let
your fears keep you from trying things," he says. "You will see different
ways to reach out to customers that you wouldn't have seen if you
didn't look at these mobile devices."
For example, he says, "We have created mobile sales and marketing
applications that allow our field reps and customers to have much
more valuable conversations with more real-time information,"
including customer-specific data. "This allows our reps to be much
more effective and efficient in how they manage their activities and
customers."
In addition, make sure you have a real long-term strategy and
understand your needs before you start the project, Netcentric analyst
Benedict says. "Don't even bother to implement mobile technology if
you don't have a mobile management strategy -- it will be totally
wasted."
The way to do that is to become fully educated in what's possible,
Benedict says. "Go to big conferences, view webinars, read books and
bring educators in to teach and show what's available. Don't build a
strategy based on your limited knowledge." Learn about what is
possible, he adds.
Analysts: Where MDM can still get better
Mobile management applications have come a long way in the last year
or so to help enterprises, says the 451 Group's Hazelton, but there's
still more that can improve.
Today, the big needs are managing the devices and handling email, but
enterprises are already looking ahead to provide custom provisioning
of applications and data to the right people in their organizations so
the entire mobile environment can be more secure and more easily
managed, Hazelton says.
One other enterprise need that's seeing progress is the creation of
private application stores that are providing analytics apps and
management tools for mobile enterprise applications, Hazelton
explains.
"There's definitely a lot of demand for MDM," he says. "It really answers
a pressing pain point for IT departments." But so far, only about 20 to
25% of the marketplace has such strategies in place for iOS and
Android devices, based on his research. The numbers are certainly
higher for BlackBerry users, he explains, because those devices have
been around longer and use RIM's enterprise-ready applications.
"It's most exciting," he says. "You have all this energy around
smartphones and enabling them. Enterprise mobility is here for the
rest of our careers."
Overall, Carfax's Matthews says, "we tell our employees that it's all one
life and you can manage it however you want to do work and your
personal stuff. We get a lot more out of employees that way. I think
they're happy personally because they don't see this device as tethered
to them and they can do other things in between work assignments."
Tips for creating an enterprise MDM strategy
Enterprise IT leaders who have been working to build MDM programs
inside their companies offer these ideas for how to get started.
Decide what devices your workers will use, whether they'll be
corporate-issued devices or bring-your-own devices that will be
supported by the company.
Make sure that whatever devices you choose can handle the level of
security that your business requires.
Create and implement strong security and device use policies and be
sure to communicate them with employees from the start. Be sure that
your devices include remote wiping capabilities and automatic remote
alerts that can tell you if unauthorized users are trying to access or
hack the devices.
Require and implement mandatory strong passwords to keep them as
secure as possible.
Examine how your MDM plan terms will be viewed legally wherever
your company does business, from state to state in the U.S. and in
other nations, to be sure that you abide by all applicable laws.
Explain to employees which applications will be approved and
permissible on employee devices.
Don't be surprised if there is some disgruntlement from some
employees when the new MDM strategy is implemented. Make sure to
educate, train and, if possible, offer some benefit with the new
approach.
Remember that your MDM plan will never be finished, but will need to
constantly evolve as new devices and technologies are introduced.
- Todd R. Weiss