This is the part two of the article about Enterprise Mobile Strategy. You can read the part one here.
Continuing from the part one where we discussed user centric points, let’s discuss some resource and infrastructure aspects. Allowing mobile access adds to stress level of the IT and the upper management, as suddenly a large number of new devices start connecting to enterprise’s digital assets from around the globe.
Of course, the laptops laid lots of groundwork already but they also used VPN, certificates, fully patched OS. Without many of these safeguards, a Man in the Middle (MITM) attack could easily gain access to enterprise’s network. And a poorly secure app could let a malware siphon highly personal user data like family photos, GPS data, health data etc. from the device.
Keeping that in mind, let’s look at the remaining points:
Enterprise Mobility Management (EMM)
EMM is comprised of Mobile Device Management (MDM), Mobile Application Management (MAM) and Mobile Information Management (MIM).
The BYOD throws a big wrench in the device management plans. Employees won’t be willing to hand over enterprise the access to their personal device. Neither will they be willing to let enterprise control their personal device/data. That takes out MDM but leaves only MAM and MIM to play a central role.
Point: Instead of focusing on controlling the device, control the enterprise apps via MAM or an enterprise app store.
Security/Identity Management
The constraints on the device management leads us to the subject of Security. Enterprise security needs to be simple but effective. Provide only one access point and make it so reinforced that neither a giant or an arrow can defeat it.
Point: Provision one security gateway as it’s easier and effective to control one access point than four. Leverage MAM (Mobile App/Access Management) well.
Data Security
This is where focus should be. The data security to be effective, it should be woven into all aspects of the mobile strategy.
Point: Get employees in on the need for data security. Then they’ll be willing to cooperate and be extra vigilant. Tailor your MIM (Mobile Information Management) well.
Data Collection Constraints
Of course what access permissions you want from users depend upon the app functionality. But note that intrusive and unjustified access permissions will give users a pause. So it’s best to develop some policies surrounding what permissions your app can ask and when.
Point: Why to ask for a key for a door that you don’t intend to enter?
User Support
Mobile users need extra support, because there’s an abundance of different combination of device and OS versions. A frustrated user could quickly delete your app and may never return.
Point: Don’t assume your existing support structure can handle that without any training or resources.
Bring your own device (BYOD)/ Wear your own device (WYOD)
BYOD is here and real. Believe me, no one wants to be responsible to keep more than one device charged. Already employees are clamoring for using their personal devices.
Point: Choose your battles. Instead of focusing on device, focus on data security.
All right, that does it. I purposely kept it in lighter vein, as I know how drab such post can easily become.
Let me know suggestions/corrections, if any.
Happy Mobility!
Add Comment