Mobile Device Management
Mobile devices have changed the way we do business over the last ten years. From the humble mobile phone to the latest smartphones, phablets and tablets, businesses can now stay in constant touch with customers, colleagues and suppliers through text, emails, FSS (File Sync and Share) services and social media.
If your business runs a BYOD (Bring Your Own Device) policy or supplies mobile devices for use by staff and contractors, then you will want to be safe in the knowledge that these devices are secure and that your valuable company or customer data is safe.
Mobile Device Management (MDM) allows for the remote control of all devices that have your company data on them. This includes;
- Encrypting devices and enforcing security best practice (such as using the PIN lock or fingerprint scanner)
- Limiting the applications that can be installed and used
- Remote wipe of accounts and data (in case an employee leaves the business or a device gets lost or stolen)
- Data backup and restore
- Jailbreak detection
How Devices are Managed
Depending on your business needs, a device will need to be enrolled in the service before company data (including emails) can be accessed. In order to enrol, a number of pre-requisites must be met. This may include encryption, lock-screen security and work profile creation. This is the best way to make sure that the devices that represent a data loss risk are as protected as they can be. The ‘opt-in’ approach gives your staff the option to enrol their own device if they want to.
Once a device is enrolled, Mobile Device Management offers a simple admin interface that allows swift action to be taken should a device become compromised. The interface also allows businesses to set their own security protocols depending on the sensitivity of data and the risk of that data ending up in the wrong hands.
How We Can Help
We can help your business to implement MDM and to roll it out to your devices. Our approach includes reviewing your business needs and the devices (and operating systems) you and your staff are using, setting your MDM security protocols and the education of users on best practice when using mobile devices for company business.
If you are currently allowing your company data to be accessed on uncontrolled devices, then now is the time to rethink your strategy. To discuss Mobile Device Management with one of our team, please contact us today.