Strategic Issues in Systems Management Part 2: Mobile

If there is one IT issue C-level managers understand it’s the connection between mobile devices and workforce morale, productivity and agility. After all, most of them are big smartphone users themselves. That raises the question of what to do about BYOD.

One challenge is platform diversity. Gone are the days when IT could enforce a Windows-only or Internet Explorer-only standard.  So IT has the management challenge of how to bring all these devices together in a single holistic view with a common set of metrics and controls despite their differing technical attributes. The other alternative — having a different management view for every platform — defeats the purpose of unified system management and in fact would be unworkable.

Another challenge is how to let employees use the same device for both business and personal use. On the one hand, employees want to use their own data and applications without feeling like “Big Brother” is watching. On the other, IT (and senior management too) can’t allow uncontrolled access to corporate data and applications. One solution is a mobile app that effectively “containerizes” the corporate environment within the device, separating it from the personal environment. That way anything the user does for work — with email, web browser, productivity apps, data, and even storage — is isolated from what the user does on the personal side. All corporate data is encrypted and also encrypted in transit outside the corporate firewall. Corporate data can also be remotely wiped, i.e., deleted, without affecting personal data or applications.

Such a containerized model offers many advantages over alternative approaches. It removes the burden of device and application configuration from the user. It eliminates the need, cost and risk of putting mobile devices on the network using a VPN. And it ensures centralized policy-based management of corporate IT assets on all authorized employee-owned mobile devices without compromising the employee’s personal privacy.

Stay tuned for the launch of Kaseya BYOD!

Part 1: Security and Compliance

 

artwork of computers transfering files

How to Prepare for Windows 7 and Windows Server 2008 End of Life

Time is running out for support for Windows 7 and Windows Server 2008/R2. End of life for these operating systemsRead More

Woman wearing 90s clothing with VHS in hand

Congratulations to the Winners of Stranger Things in IT Contest!

Congratulations to all the winners of Stranger Things in IT contest! In your fights against Demogorgons and other IT monsters,Read More

Hourglass on top of laptop keyboard

What Does End of Life for Windows 7 and Windows Server 2008 Mean for Me?

Tick tock, tick tock, tick tock. The clock is ticking. Windows 7 and Windows Server 2008/R2 are reaching their endRead More

Colleagues working together in server control room

Jacobs Engineering Group Streamlines IT Management with Automation and Remote Access

A unit of Jacobs Engineering Group, a world leader in design, engineering, construction, and technical services, delivering end-to-end innovative solutions,Read More

Connect IT Asia-Pacific - Don't Miss the Premier IT Management Event of the Year - Join Us in Sydney 1-3 October 2019 - Register Now

Archives

Categories