Tuesday 16 September 2014

Enterprise mobility management

Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context. This is an emerging discipline within the enterprise that has become increasingly important over the past few years as more workers have bought smartphone and tablet computing devices and have sought support for using these devices in the workplace.
The main challenges of determining the right enterprise mobility strategy for an organization is to relate the available mobile IT to the overall purpose of the work conducted, to determine how closely the business process should be aligned to the mobile IT, and how to support mobile workers when they are using these devices in the workplace.
Business need
According to recent research, 234 million people in the U.S. over age 13 use a mobile device, and 65 million own a smartphone. By 2012, business mobile users will make up more than 30% of all subscribers in the United States. Many (~66%) smartphone owners use their personal devices for enterprise-related activities.
In 2009 and 2010, an influx of high capability smartphones and similar handheld computers reached an eager marketplace. Sales of such devices were strong and based on the strength of demand, more producers released even more devices on a variety of operating systems (OSs). The initial popularity of the Apple iPhone was eventually matched by the Google Android OS, while older platforms such as the Research In Motion BlackBerry maintained a significant, albeit shrinking, market share. Many consumers began looking for ways to use their new devices to improve and streamline work-related processes such as checking email. And while employers generally understood that mobile email and other work processes would increase productivity and employee satisfaction, supporting a wide variety of device types and operating systems would be complex, introducing security risks and high costs. A turnkey method of device management was greatly needed.
The cost, security risks and mission critical nature of mobility weighs heavily on the minds of CIOs and the market has responded by developing sophisticated systems designed to reduce the IT labor needed to support broad mobile device use in the enterprise. Such systems are generally referred to as enterprise mobility management.
Andrew Borg of the Aberdeen Group has this to say about enterprise mobility management: "Enterprise Mobility Management (EMM), the comprehensive 'cradle-to-grave' approach of managing the full mobility lifecycle, has become a hallmark of top performing organizations."
Scope
Enterprise mobility management has several dimensions including security, application management and financial management.
Security
Because mobile devices are easily lost or stolen, data on those devices is highly vulnerable. When corporate data is accessible via a personal mobile device, organizations suddenly lose a great deal of control over who can access that data. Enterprise mobility management proposes systems to prevent unauthorized access to enterprise applications and/or corporate data on mobile devices. These can include password protection, encryption and/or remote wipe technology, which allows an administrator to delete all data from a misplaced device. With many systems, security policies can be centrally managed and enforced. Such device management systems are programmed to support and cooperate with the application programming interfaces (APIs) from various device makers to increase security compliance without increased labor.
Application management
System administrators cannot expect to have the same access to mobile device clients as they would have to desktop devices that don't leave an office. Lack of access combines with operating system heterogeneity to make routine tasks such as deployments, configuration settings, application installations and help desk tasks very difficult. Each device has unique management requirements and tasks often must be performed remotely, over the air. Enterprise mobility management systems generally provide middleware to automate management tasks and insulate administrators from the complexity of performing tasks on many different types of devices. It also provides infrastructure to securely administer devices over the air. Self-management portals, which allow users to download updates and applications on their own, are another common feature.
Financial management
The cost of voice and data were once wholly contained within the walls of the enterprise. With mobile devices this is no longer the case. Often, each employee negotiates their own contract with a mobile carrier and then bills his employer for some or all of these costs as a reimbursement, creating budget unpredictability for the organization. Enterprise mobility management often includes telecom expense management features that help organizations plan for and control the overall costs of mobile voice and data transmissions. Other tasks such as carrier contract negotiations, invoice processing and/or device requisition costs, when appropriate, can also be included.
Switching to mobile web apps can be a solution to the problem
In the case of mobile web apps, both the data and the applications reside on the web server that is hosted in highly secured data center. Nothing resides in the end user devices. Users access and update corporate information with the use of a web browser on the mobile device and a log-in account. Each user is provided with a login id and password pair that can be revoked by the administrator at short notice. Additional password security can be provided by adding an SDKEY supported device. Session security is provided by the proven SSL VPN connection security and encryption technology. SSL server certificate issued by an authorized provider has to be installed on the web server. The web server access log logs all user accesses. The log can double as intrusion detection tool, logging all accesses including illegal access attempts. Access permissions to different applications and data sets on the system can be granted or removed from users and user groups by the administrator. No installation is required on the end user mobile devices. Since users prefer to use their own personal devices to access corporate information, there is no need for employer to provide such devices. Furthermore, the same apps and data are also available to traditional desktop and laptop users.
Posted by : Gizmeon

No comments:

Post a Comment