Information Technology Divisions (I.T.) traditionally does not deal with securing a device that has not been issued and controlled by them. Bring Your Own Device (BYOD) has exploded across industries. Rapid adoption of iPhone and Android devices displaced Blackberry Enterprise Server (BES) in the mobile enterprise email space. Adoption of new devices drives the need for Mobile Device Data Management software to assert control.
For example, in Microsoft client and server networks everything had matured to the point of predictability and most devices were handled within similar user, device and data security controls boundaries. I.T. is generally unprepared for the demands from BYOD, resulting in increased risks. I.T. continues to struggle with user requirements to use their own devices with local to global mobility.
There are over thirty (30) MDM software solutions to choose. Like all buying scenarios, too many choices create confusion. Confusion about how best to approach MDM software purchases remains prevalent. There are at least eight (8) major areas of concern. Each area consisting of multiple crucial questions:
- Infrastructure – How should I.T. deploy MDM (e.g. On premise, Cloud based or a Hybrid)?
- Security – Can I.T. detect and manage Jail broken or rooted devices? Can I.T. force encryption options for data-at-rest and data-in-flight? Can data be wiped off of a device, without wiping an entire device?
- Device Support – What devices should an enterprise support (e.g. Apple IOS)? Can we consider devices of different operating system (e.g. IOS 3, 4, 5, 6)
- Lost or Stolen Devices – Can lost or stolen devices be managed to reduce data breach risk?
- Scalability – Can I.T. effectively scale a software solution to meet user mobility demands?
- Ease of administration – Can I.T. enforce device policies? Does I.T. need to physical touch the device in order to effectively manage security?
- Applications – Can we blacklist applications on devices? Can applications be deployed from within our Enterprise (e.g. Private App Store)?
- Alerting and Reporting – Can we effectively report on new devices, devices with blacklisted applications, etc?
- More than 50% of network devices ship without a wired port
- By 2015, there will be 7.4 Billion wireless devices
- 1.2 billion smartphones will enter the market over the next 5 years
- Enterprise tablet adoption will grow by almost 50%
- By 2015 mobile app development will outnumber PC projects by 4-to-1
- Product must be shipping by 4/15/13
- Product must be marketed as MDM
- Must provide functionality as original software, not OEM
- Must support functionality through software, not services
- Must support Android and IOS, may support Windows 8
- There must be sufficient information available to DCIG to make meaningful decisions.
- Security and Compliance
- Operating Environment
- User Experience
- Management
- Support