Managing Mobile Devices Effectively

Updated: July 21, 2008

Issue

Do you ever wonder if the increasing number of employees who use handheld devices containing sensitive company information is prompting IT managers to panic? Well, according to a report from ABI Research, mobile-device-management services are forecast to grow from $583 million in 2007 to more than $20 billion by 2013, for a compound annual growth rate of 80 percent. How's that for a resounding "yes"? By addressing concerns such policy development, procurement management and device/content services, mobile-device- management solutions promise to alleviate IT managers' concerns by securing, updating and managing employees' handheld devices.

Analysis

It's easy to understand the considerable burden that mobile devices place on an IT department. Just ask Stephen Drake, program director of mobile enterprise at research firm IDC. For starters, he said, "Many of the devices being used in businesses today are actually being brought in by individuals. As a result, organizations aren't necessarily aware of what's out there, what's being used by their employees and what information these employees are accessing."

But that's not all. In the past, high-priced PDAs were used only in the workplace and were left abandoned in office cubicles for evenings and weekends. But due to the increased popularity of flexible work arrangements and mobile devices' enhanced storage capabilities, that's no longer the case . These days, mobile devices travel everywhere and store everything from the babysitter's home address to last quarter's sales revenue. "There's this growing convergence of personal and professional usage on these devices," warned Drake.

Further complicating matters is the fact that many companies don't adhere to a comprehensive and uniform approach to purchasing mobile devices and carrier services. Said Drake, "With a lack of policies, it's just the wild, wild west. People are just signing up with any carrier, using any device they want and in many cases, gaining access to corporate services without any knowledge of IT."

Unfortunately, chaos isn't the only byproduct of poor mobile-device management. If you fear the damage done by lost or stolen laptops, consider this: Shipments of converged mobile devices in the U.S. are expected to increase from 25.6 million in 2008 to 44.4 million in 2011. That's an explosive number of devices at risk of being compromised.

"There's the capacity to keep tremendous amounts of proprietary information on a mobile device," said Drake. "So companies are really in jeopardy of some potential catastrophes."

Fortunately, mobile-device-management solutions from vendors including Novell, Nokia and Sybase can help. These tools enable IT managers to:

  • Centrally administer and enforce password policies, requiring that passwords be used on all devices at all times
  • Implement self-destruct or lockout capabilities for lost or stolen devices
  • Make data available on the network for centralized backup for compliance purposes
  • Manage device configurations across an entire organization from a central console to ensure standardized usage policies
  • Detect and remove user-installed applications
  • Run virus scans on devices and handle two-way IP packet filtering and inspection
  • Conduct real-time scanning of any and all files received by mobile devices

Recommendations

Of course, mobile-device-management software can't safeguard against any and all mishaps. But with the proper technology and policies in place, it may just help IT managers sleep more soundly.

For more information on IT security, visit the IT Security Resource Center. There, you'll find in-depth research, topical research briefs and advice from Focus Experts.

Featured Research
  • What You Need to Know About VoIP Security

    No matter the industry or area of expertise, a strong VoIP system is the perfect tool for any business looking to take both its internal and external communication to the next level. more

  • Are You Using These 5 VoIP Features?

    In large part, the success of your business depends on the strength and reliability of your team’s many communication networks—this includes your Voice over Internet Protocol system (VoIP). more

  • Go Mobile and Increase Employee Productivity

    The Bring Your Own Device (BYOD) and Voice over Internet Protocol (VoIP) tech trends now allow people to work whenever, wherever, and however they want—mobility makes it happen. more

  • [Infographic] How to Select a Phone System in 10 Steps

    Choosing the perfect phone system for your business is no small task …. Depending on the size of your company, the industry in which you work, and the specific needs your phone system will be required to meet, any number of solutions could get the job done. more

  • 2017 Business VoIP Cost Guide

    Reducing expenses is one of the main reasons that businesses switch from traditional office phone systems to VoIP technology. But many people rush this decision and end up spending more than they need to. The costs of implementing a new VoIP system can increase quickly, especially if you don’t strategically plan for it ahead of time. more