Enterprise
mobility management (EMM) is the set of people, processes and
technology focused on managing the increasing array of mobile devices,
wireless networks, and related services to enable broad use of mobile
computing in a business context. This is an emerging discipline within
the enterprise that has become increasingly important over the past few
years as more workers have bought smartphone and tablet computing
devices and have sought support for using these devices in the
workplace.
The
main challenges of determining the right enterprise mobility strategy
for an organization is to relate the available mobile IT to the overall
purpose of the work conducted, to determine how closely the business
process should be aligned to the mobile IT, and how to support mobile
workers when they are using these devices in the workplace.
Business need
According
to recent research, 234 million people in the U.S. over age 13 use a
mobile device, and 65 million own a smartphone. By 2012, business mobile
users will make up more than 30% of all subscribers in the United
States. Many (~66%) smartphone owners use their personal devices for
enterprise-related activities.
In
2009 and 2010, an influx of high capability smartphones and similar
handheld computers reached an eager marketplace. Sales of such devices
were strong and based on the strength of demand, more producers released
even more devices on a variety of operating systems (OSs). The initial
popularity of the Apple iPhone was eventually matched by the Google
Android OS, while older platforms such as the Research In Motion
BlackBerry maintained a significant, albeit shrinking, market share.
Many consumers began looking for ways to use their new devices to
improve and streamline work-related processes such as checking email.
And while employers generally understood that mobile email and other
work processes would increase productivity and employee satisfaction,
supporting a wide variety of device types and operating systems would be
complex, introducing security risks and high costs. A turnkey method of
device management was greatly needed.
The
cost, security risks and mission critical nature of mobility weighs
heavily on the minds of CIOs and the market has responded by developing
sophisticated systems designed to reduce the IT labor needed to support
broad mobile device use in the enterprise. Such systems are generally
referred to as enterprise mobility management.
Andrew
Borg of the Aberdeen Group has this to say about enterprise mobility
management: "Enterprise Mobility Management (EMM), the comprehensive
'cradle-to-grave' approach of managing the full mobility lifecycle, has
become a hallmark of top performing organizations."
Scope
Enterprise mobility management has several dimensions including security, application management and financial management.
Security
Because
mobile devices are easily lost or stolen, data on those devices is
highly vulnerable. When corporate data is accessible via a personal
mobile device, organizations suddenly lose a great deal of control over
who can access that data. Enterprise mobility management proposes
systems to prevent unauthorized access to enterprise applications and/or
corporate data on mobile devices. These can include password
protection, encryption and/or remote wipe technology, which allows an
administrator to delete all data from a misplaced device. With many
systems, security policies can be centrally managed and enforced. Such
device management systems are programmed to support and cooperate with
the application programming interfaces (APIs) from various device makers
to increase security compliance without increased labor.
Application management
System
administrators cannot expect to have the same access to mobile device
clients as they would have to desktop devices that don't leave an
office. Lack of access combines with operating system heterogeneity to
make routine tasks such as deployments, configuration settings,
application installations and help desk tasks very difficult. Each
device has unique management requirements and tasks often must be
performed remotely, over the air. Enterprise mobility management systems
generally provide middleware to automate management tasks and insulate
administrators from the complexity of performing tasks on many different
types of devices. It also provides infrastructure to securely
administer devices over the air. Self-management portals, which allow
users to download updates and applications on their own, are another
common feature.
Financial management
The
cost of voice and data were once wholly contained within the walls of
the enterprise. With mobile devices this is no longer the case. Often,
each employee negotiates their own contract with a mobile carrier and
then bills his employer for some or all of these costs as a
reimbursement, creating budget unpredictability for the organization.
Enterprise mobility management often includes telecom expense management
features that help organizations plan for and control the overall costs
of mobile voice and data transmissions. Other tasks such as carrier
contract negotiations, invoice processing and/or device requisition
costs, when appropriate, can also be included.
Switching to mobile web apps can be a solution to the problem
In
the case of mobile web apps, both the data and the applications reside
on the web server that is hosted in highly secured data center. Nothing
resides in the end user devices. Users access and update corporate
information with the use of a web browser on the mobile device and a
log-in account. Each user is provided with a login id and password pair
that can be revoked by the administrator at short notice. Additional
password security can be provided by adding an SDKEY supported device.
Session security is provided by the proven SSL VPN connection security
and encryption technology. SSL server certificate issued by an
authorized provider has to be installed on the web server. The web
server access log logs all user accesses. The log can double as
intrusion detection tool, logging all accesses including illegal access
attempts. Access permissions to different applications and data sets on
the system can be granted or removed from users and user groups by the
administrator. No installation is required on the end user mobile
devices. Since users prefer to use their own personal devices to access
corporate information, there is no need for employer to provide such
devices. Furthermore, the same apps and data are also available to
traditional desktop and laptop users.
Posted by : Gizmeon
No comments:
Post a Comment