As mobile devices proliferate in the workplace, many CIOs are scrambling to secure them. I’ve secured mine. It’s actually not that hard to do, and there are a few solution providers that make it easy.
But the employee with a mobile phone in each hand and a tablet on his lap, gets my vote as the poster boy of corporate security risks for the next five years. This is a very real concern for small and large organizations. It is the anxiety that every CIO faces as more and more data is transmitted through devices that are not controlled by IT.
The presumption now is that IT has already lost, that the fight is over. That now, they just have to give in. And when they give in, they’ve got to let everything else in. And when they do that, they’ve lost control.
But the fight isn’t over; we just haven’t had the tools to help take back control of mobile security while helping employees remain productive. It turns out, we just didn’t know where to look – or at least I didn’t -until now.
Here are five mobile device management solutions that I discovered that can help.
#1 XenMobile, Citrix
Chandra Sekar, Director of Product Marketing, “Businesses have spent the last decade, not to mention billions of dollars, securing their corporate networks and making sure they are compliant. However, when it comes to mobile devices, all the security and compliance holes that businesses spent the last decade fixing are completely open again – because mobile devices tend to bypass traditional controls.”
What I like about XenMobile, is that they provide an integrated approach that allows IT to secure, manage and support mobile devices, apps and data, and set app and data policies based on device ownership, status or location. They also make it easy for users to access email, web, documents, and corporate apps with one click on any mobile device.
Kevin Kiley, Director of Enterprise Solutions, “Companies need to understand that their data is not secure when devices are not managed. When employees use their mobile devices for work they often unintentionally compromise corporate data from email attachments and by storing documents in unsecure locations. Unmanaged functions like voice recognition on devices also contribute to organizational risk by letting someone bypass the lock screen to send emails or access sensitive information.“
For me, AirWatch provides a lot of flexibility for organizations to manage the devices, applications, email and content through full a fairly robust mobile device management system. Your employees simply enter their username and password and Airwatch automatically and wirelessly configures all of the device settings, security policies, applications, email and content based on the employee’s role in the organization.
#3 Mobile Iron
Because most employees use their mobile devices for both personal and business purposes, regardless of who owns the device. Mobile Iron wants you to do your work while mobile, but they don’t want you to put your personal data at risk. A Mobile Iron representative recently told me, “We did a survey that found that when respondents were asked “What information on your mobile device do you think your employer can see?” nearly half the respondents (41%) were sure their employer could not see any information on their mobile device, while 15% were not sure. Only 28% think their company can see their work email and attachments while only 22% think their company can see their work contacts.”
The reality is that if these devices are used to get corporate email, employers can see work email and attachments on a mobile device as easily as they can on a PC. That’s a gulf between expectations and reality. Organizations need to be able to separate personal content from corporate content and they need to communicate to their employees what they can see and why they need to see it. The risk of not protecting privacy and not communicating policies is that employees will find ways to work that may put company data at risk.
So the MobileIron enterprise mobility management (they call it EMM) platform secures and manages apps, content, and devices. It supports both corporate-owned and personally-owned devices which is best for situations where companies support a Bring Your Own Device (BYOD) program. They support multiple mobile operating systems including iOS, Android, Windows 8 and possibly BlackBerry.
Good Technologies offers another kind of secure BYOD program that focuses on security while keeping employees productive. Good’s secure container places a secure partition between personal and business data to protect email and other programs. That way, you can support BYOD programs with more confidence and that your confidential data and apps will remain secure.
#5 Samsung Knox
Samsung KNOX is a mobile security solution for Android devices. They cover the hardware, the architecture and the apps with a multi-layered security standard that the enterprise demands. KNOX also has enhanced security at every level to help protect your network from hacking, malware, viruses and unauthorized access. If you’re looking for a great Android mobile security solution, you can’t do much better than Knox.