Mobility is a critical or high priority for almost two thirds (64%) of organisations*.
And why wouldn’t it be?
Mobility not only enables increased productivity; it also opens the door to real business transformation. Specifically, the IDG research indicates that the most significant factors behind mobile investment are:
No benefit comes without a price. Mobility introduces a whole new set of risks to your organisation, and specifically your corporate data.
While your business motives for enabling mobility initiatives are valid and worth pursuing, you can’t afford to ignore the details of its technical implementation. They could be the difference between revolutionary innovation and regulatory investigation.
This is the most important question you can ask your IT department. It will tell you if there is a cohesive company strategy behind their mobility plans and whether it has the right focus on supporting productivity, growth and digital transformation.
An MDM tool allows you to centrally manage and monitor all mobile devices that are connected to your corporate network or which access business applications or files.
MDM tools help to support mobility in a secure and scalable way through a range of features, such as allowing you to remote-wipe if a device is lost or stolen, or the ability to track times and locations of logins from mobile devices, so that you can spot unusual activity that could signal a security threat.
You can choose between on-premises, hybrid or cloud deployment with a lot of MDM tools. The benefit of choosing the cloud is that it offers flexibility and scalability. But beware: some tools have different features for cloud or on-premises versions.
It’s much easier if your MDM tool integrates with your email system, file storage apps, software, directory services, and so on. So make a list, and make mobile management simpler.
81% of breaches are caused by compromised credentials. Watch this free webinar on-demand and discover:
Cloud apps are ubiquitous and it’s likely that employees are using non-approved SaaS services without the IT department’s knowledge. This is known as ‘rogue IT’.
Make sure you monitor its proliferation, have (really) good data security (see question 10) and factor in unexpected integration demands into your mobile strategy.
Supporting a ‘bring your own device’ policy means supporting multiple platforms. Will your line of business applications work across those devices? What about your MDM? Have you thought about containerization, which separates personal from corporate data on a device?
BYOD isn’t a security risk in itself. You just need the right foundations in place to support it securely.
When it comes to preventing data leakage, as Glen Gruman of InfoWorld says: “the right approach is to manage data access at the source, not the endpoint.”
Device management is only one part of the mobility puzzle. At the heart of the wider “access” challenge is, as Microsoft says, “one protected common identity for secure access to all corporate resources.”
Conditional access lets you create rules to make sure only the right people have access to sensitive data and that the device they access it on has sufficient security and device management features in place to keep that data safe.
There’s a big difference between being able to access data and download data. If sensitive corporate data is stored on a mobile device, it’s left open to theft, accidental loss, or even data leakage via accidental sharing.
Cloud apps make it easier to provide access to data without actually putting that data out in the open.
Alongside MDM and identity and access management, data protection is the third member of the holy trinity for secure enterprise mobility.
Modern data protection means embedding security in each piece of data, whether that’s through encryption, rights management, tokenisation or sharing restrictions. Doing so means that even if data is out in the open, it doesn’t pose a threat to your business.
Security is the greatest concern associated with mobile, according to IDG, but it doesn’t have to be. Technology exists to support mobility and business transformation securely. The first step is to get business stakeholders and IT in the same room, get them talking, and start your secure digital transformation journey.
Next, watch our conditional access and MFA webinar on-demand and learn why these technologies are key to enabling a secure, mobile workforce.
Or download ‘The future of enterprise mobility’ e-Guide and discover how to address the balance between security and mobility at a strategic level.
Keep your finger on the pulse of security and Microsoft technology. Submit your business email to get the latest content and event invites straight to your inbox.
As head of our Mobility & Security practice, Mat’s responsibilities include ensuring that our technical knowledge and delivery capability are fully up to speed and current, as well as creating a...
READ AUTHOR'S FULL BIO
Find out how conditional access and MFA mitigate the risk of a data breach.Watch now
Send us your questions or feedback.
Friendly folks are standing by!
Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.
You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.