Browsing Posts tagged mobile device management

Did you know that by 2014 employee-owned smartphones and tablets used for business will more than double to nearly 350 million (Juniper Research)? A mobile workforce can be a boon for employers in many regards—think productivity. If employees can access the network anywhere, anytime, on the device of their choosing, limitations of the traditional nine-to-five workday no longer exist. Not to mention the potential to work more efficiently, while cutting down on monetary and environmental costs.

But the thought of hundreds of thousands of devices accessing the enterprise network can be enough to keep IT managers and CEOs up at night—and with good reason. Between faulty hardware, hackers, and the occasional human error (lost phones, for example), enterprise mobility can expose an organization to security and compliance risks.

As BYOD shows no signs of slowing down, how can your organization equip itself to be on the cusp of this shift in the way business is done, while minimizing the potential threats?

Here are five tips for embracing BYOD, while also making sure your company isn’t vulnerable to any security risks:

1. Complete a full security audit – Have the IT department evaluate the corporate network for vulnerabilities that come with opening up the network to dozens (even thousands) of new devices, and update the security infrastructure accordingly.

2. Implement Mobile Device Management (MDM) – MDM can go a long way toward providing management and security for mobile devices. Companies should require that all employees enroll their devices that access the network in a corporate MDM system. By doing so, devices can be automatically configured for access to corporate email and resources. In addition, any necessary restrictions and policies can be applied using MDM, such as ensuring that devices require an unlock code to be accessed.

3. Use solutions that integrate with Active Directory, or a similar tool – For many regulated industries, tracking which devices are accessing the network is critical. With Active Directory integration, you can ensure a level of monitoring that meets the strictest of compliancy regulations—for example, knowing the details of exactly which devices are accessing the corporate network at all times.

4. Provide simple solutions to allow employees to access corporate content in a secure manner – File access needs to be managed and secured—and Mobile File Management solutions can help with this—but file access also needs to be easy for employees to use. There are many unsafe consumer grade file-sharing alternatives that employees can resort to if the solution provided by the enterprise isn’t user-friendly. An ideal solution is one that has the simplicity and ease-of-use provided by consumer grade solutions with enterprise grade security.

5. Role-based access to data – By employing solutions that integrate with Active Directory, or similar tools, enterprises can easily provide the right level of access. You can allow employees to have the same access and permissions as they do from their desktops and laptops, or have much tighter restrictions on mobile access. The right tool will give you the flexibility to choose.

6. Being prepared for the worst to happen – It’s inevitable that, at some point, employees will lose or break their devices. Make sure you have a plan in place so they know how to report it and get the device wiped and removed from accessing the network.

By embracing mobility with a solid plan in place, your organization can not only minimize the threat of security risks, but, more importantly, maximize the benefits of the mobile enterprise.

Yesterday we announced our new mobilEcho 3.7, which includes our much-anticipated Good Dynamics integration. There are a number of reasons why our work with Good Technology is very important to customers and I thought I would explain some of them:

1. Integration is good (pun intended) – Both Good Technology and GroupLogic are focused on providing customers with secure and managed enterprise mobility functionality. With Good Dynamics integration, customers can now have seamless and secure access to files while the Good Dynamics container provides a secure ecosystem of enterprise apps. Customers can enjoy both without any hassles.
2. FIPS-certified crypto – this is especially relevant for Federal customers here in the United States but other non-Federal organizations and companies take notice of this as well. And, this goes without saying almost, encryption on the device and in transit is paramount.
3. Support for BYOD – the combination of Good Dynamics and mobilEcho can accelerate BYOD initiatives as companies can now provide employees with a work container that secures files and content for the organization, while not impacting any of the employee’s personal apps and data. If an employee leaves, or a device is lost/stolen, the IT administrator simply wipes the mobilEcho app and/or all the other apps with the Good Dynamics environment remotely.
4. Ease of deployment – it’s easy to deploy mobilEcho within the Good Dynamics environment. This makes it as frictionless as possible.

We have already seen a tremendous response from customers on this and expect to hear more. If you want to learn more about mobilEcho 3.7 and the Good Dynamics integration you can watch this video. Or take a look at the data sheet here.

You can also learn more about Good Dynamics on Good’s web site here.

Last week we introduced mobilEcho 3.5, the latest version of our Mobile File Management solution. In this version we introduced a number of new features including:

• Two-way syncing of files;
• HTTPS Reverse Proxy password and certificate authentication;
• Streamlined device enrollment process;
• Integration with Quickoffice’s “Save Back” feature; and
• Whitelisting or blacklisting of third party apps allowed to “Open In.”

One of the things we continue to hear from our customers loud and clear is the need for security. Many of the features that we have introduced with 3.5 have their origins in requests from customers that were security-related. HTTPS Reverse Proxy password and certificate authentication enables requiring two-factor authentication which is a frequent request, especially from financial services companies. Integration with Quickoffice and their “Save Back” feature allows a user to access a document in mobilEcho, use “Open In” to open the doc in Quickoffice, edit it, and then save it back to mobilEcho. This also sets the stage for some other cool things we will be able to do in the future. The whitelisting and blacklisting was yet another request by customers, many in regulated industries. The IT and Security departments want the ability to limit the apps that can be used to open a file from mobilEcho. Again, the demand from the enterprise is to ensure that mobile users are not employing non-sanctioned tools so that they can limit their security and compliance exposure.

This is not to minimize the introduction of two-way syncing or the improved enrollment process. For example, the one-way syncing feature we’ve had since last year has been extremely well received by our customers. One hailed as the feature that made mobilEcho a true “business platform.” With the introduction of two-way syncing the ability to collaborate on files is even greater with mobilEcho.

As I have noted in past posts, this is a continuing theme for mobilEcho and it will continue to be a theme for a long time. We have many more exciting features we will be rolling out in the next few months so stay tuned…

Today we announced a new partnership with Salesforce.com and are pleased to report that mobilEcho is now listed on the Salesforce AppExchange Mobile. Over the past few months we have been working on an integration with Salesforce.com which will allow companies to empower their field sales force to take full advantage of their iPads and iPhones. mobilEcho users already have access to all the documents and content they need to do their jobs. This new Salesforce.com feature will allow mobilEcho to optionally require a user to log an activity in an Account or Lead when showing a customer a specific file using mobilEcho. So for example, a salesperson could be showing a presentation or data sheet and that activity can then be directly logged into Salesforce.com. This helps with productivity and it also helps enterprises get more accurate, up to date client activities.

This is especially relevant for regulated industries, such as finance, healthcare, pharma, biotech, insurance, energy, government and others, who want to be able to provide secure mobile file access for their field forces utilizing Salesforce.com. And it fits nicely into one of the mobile use cases we still see constantly: the remote sales force or service personnel.

Today we announced a new development and marketing partnership with Good Technology where GroupLogic’s secure Mobile File Management (MFM) solution mobilEcho™ will support integration with the Good Dynamics™ platform. Joint customers will be able to deploy mobilEcho within the Good Dynamics environment. This follows Good Technology’s announcement of their early ISV partners for their Good Dynamics platform.  Good Dynamics is a new security platform for mobile application development targeting developers of both enterprise and consumer applications. We are one of the early adopters of the plaform, and are already working closely with them to ensure that mobilEcho runs simply and securely within the Good Dynamics environment.

There are several reasons why this relationship, and others like it, is important for enterprises. First, this announcement, and others, show that what has appeared to me to be a fairly fragmented market with many, many vendors is further embracing the notion of the ecosystem and its importance. Enterprises do not want 10s (or even 100s) of disparate pieces of mobility software running in their enterprise and on their mobile clients. They want integration which simplifies management and maintains security. Second, it reinforces the idea that Mobile Device Management (MDM) and Mobile File Management (MFM) are complementary and the foundation of any enterprise mobility strategy. This is what we are hearing from customers every day especially those enterprises that are starting to take a long term view of what they want to do with mobility and the significant impact that will have on how their employees use mobility in their every day worklife. Said more simply, we are only at the beginning.

If you are interested in seeing more on what we are doing with Good Technology and Good Dynamics, we also did a video showing how mobilEcho works within the Good Dynamics platform. This was shown last at the CTIA show in San Diego at an event that Good was hosting. It can also be seen here on our website.

You can also read our press release on our web site at http://www.grouplogic.com/about/press/

Also, if you want to learn more about mobilEcho we are doing our monthly live demo and chat tomorrow (wednesday October 12) at 11 am. You can register here.

This week’s blog post is from Reid Lewis, our President and one of our Founders. Reed is also President of the Enterprise Desktop Alliance which has recently changed its name to the Enterprise Device Alliance (EDA). This change was done to reflect the changing nature of computing and computing platforms – Anders

On September 22, GroupLogic and its EDA alliance partners announced that the Enterprise Desktop Alliance has changed its name to the Enterprise Device Alliance to reflect the growing importance of iPhones, iPads and other mobile devices in large organizations. The press release can be found here.

The members of the EDA see this as the natural evolution of our Alliance, meeting the changing requirements of enterprise IT organizations. Since 2008, when our organizations came together in recognition of the growing importance of the Mac in enterprise IT, the landscape has evolved considerably. But the rapidity of the adoption of mobile computing is unlike anything in our collective experience. Thus, it’s natural that the EDA adapted to support organizations’ IT infrastructures as they grapple with this new landscape in which mobile devices will play a major and perhaps even dominant role as the tools to access the power of information technology.

Moving ahead, the Enterprise Device Alliance will work to identify and address the challenges faced by IT organizations when they deploy iPhones and iPads in their organizations. Existing EDA offerings such as our Resource Center will now include material on mobility solutions such as mobile device management (MDM), mobile file management (MFM), identity and access management (IAM), IT service management (ITSM) and other solutions that are important to IT organizations. The Alliance is dedicated to adding new solutions that address issues that are unique to enterprise mobility.

EDA webinars, whitepapers, articles, surveys, and presence at industry events will include solutions for iPhones, iPads and other mobile devices as well as the Mac. In these materials, we’ll explore the issues that confront organizations as they plan and deploy these mobile devices and explore how solutions from our companies can help.

The EDA is also doing a survey on mobile device usage. If you are interesting in participating you can find the link here .

We’d value your feedback as to what’s important to you, so let us know what’s on your mind by writing to us at info@grouplogic.com, or posting a comment on this blog, or on Twitter @grouplogic.

In the last few weeks I have written about the complementary relationship between Mobile Device Management (MDM) and Mobile File Management (MFM). As a proof point to that, yesterday we announced a new partnership with MobileIron (press release is here), a leading MDM vendor and the innovator in enterprise management and security for mobile devices and apps, and we are one of the first companies to join their MobileIron AppConnect program. This partnership spans marketing, development and sales.

MobileIron Appconnect is loosely a mobile device management framework which allows enterprises to secure mobile apps and data. Essentially this allows apps, such as our mobilEcho, to operate within the MobileIron ecosystem with all the security and management capabilities inherent with MobileIron. This will not only provide more secure mobile computing but will also greatly enhance management capabilities through integration.

We are already seeing (and actively engaged with) enterprises who want to have mobilEcho as part of their enterprise mobility strategy and see it as very complementary to MDM. Some of the organizations have already bought MDM and considering mobilEcho as an add on. Others are considering MDM for the first time and they see mobilEcho as a natural extension of that effort. Our partnership with MobileIron is an outgrowth of this demand and a desire on the part of both companies to deliver complete solutions to customers.

Over the next few months I will be keeping you updated how customers are leveraging this partnership to provide an integrated MDM and MFM environment and experience for their users.

There is no doubt that security is one of the key topics raised by customers when discussing their enterprise mobility strategies. One of the first things I would say about mobile security is that good mobile security starts with good overall security. What I mean by that is that mobile security has to be viewed in the greater context of an overall security infrastructure within an enterprise. Why? There are several reasons, but scaling and streamlining management is one, setting a universal set of policies is another (although there needs to be flexibility here), and to address the notion that a security plan is only as good as its weakest link. So you can’t view mobile security in isolation, especially given the current and projected proliferation of these devices and their increasing usage.

From a mobility perspective, many of these discussions start with Mobile Device Management (MDM) solutions such as those from Mobile Iron, Good Technology, Sybase, AirWatch, Absolute, JAMF, and others. However, there is also a need to provide secure Mobile File Management (MFM). Just like enterprises need to provide simple and secure file access to their desktop and laptop users, they also need to do that on mobile devices. This means an MFM solution requires several things:

1. Providing encryption in-transit as well as on the device
2. Integrating with existing security infrastructure, such as Active Directory
3. Giving IT the management capabilities to turn functions on/off to meet corporate security policies. For example, the ability to turn on/off the “open in” function.
4. Remote wipe so that the application and its data can be permanently deleted if the device is lost, stolen or compromised.
5. Having control of the file servers/storage resources themselves.
6. Ability to audit both management and user activities.

And there is much more of course but those are some of the basics to think about. If you are interested in hearing more about mobilEcho, we are holding a live demo/webinar/chat on October 12 at 11am Eastern (4pm GMT). The registration is here: https://www2.gotomeeting.com/register/523964858 . This is a general overview of mobilEcho but highlights many of the enterprise security features as well.

We have been holding monthly webinars and live demos on mobilEcho for a few months now, and we have received a tremendous response (even for what would be considered down months in July and August). One of the things we learned pretty early on is that there is no substitute for seeing the product in action and that is why we these live demo sessions have been so popular (and why we do the 21-day free trial). Our mobilEcho Product Manager, Brian Ulmer, runs through a few quick slides then spends the majority of the time demo’ing the client and management capabilities of mobilEcho. And we answer questions via chat. Hope you can join us.

You can follow me on Twiitter @andersgl and you can follow GroupLogic @grouplogic.