Home
Business Guide
 
simplicable technology guide   »  technology definitions   »  mobile device management

Mobile Device Management Explained

        posted by , December 17, 2011

Most organizations have opened their networks to a wide range of mobile devices. Some no longer require that each and every device be approved by the IT department. In some cases, employees are permitted to use their own devices at work. As a result, many organizations have an urgent need to manage a great number of heterogeneous mobile devices.

Mobile Device Management (MDM) tools offer a solution — enterprise management of heterogeneous mobile devices.

Provisioning and Support

One of the key selling points of MDM tools is their ability to lower support costs through automation. Common functions include:

software distribution

device update

application removal

the ability to block applications


Policy & Compliance Management

The ability to configure and enforce enterprise mobile policy.

Security Management

Mobile devices are a common source of information leakage. Numerous security threats and vulnerabilities must be managed across mobile platforms to protect a organization's networks. Common MDM security features include:

Jailbreak detection

Password policy

Device wipe

Remote lock

Audit log


Less common features include content filtering and automatic security incident response (automatically wipes a lost or stolen device).

Service Management

MDM service management rates telecom services. Reports can be generated that are useful for managing telecom vendors. In some cases data is generated that can be used to validate telecom bills.

Cost Control

Some MDM vendors offer cost control functionality that monitors usage and escalates against a cost policy.

Reporting

Reporting on device inventory, security incidents, device status and service outages is provided out of the box by many MDM tools. Some organizations prefer to import data into data warehouses and build reports with in-house BI tools.

3 Shares Google Twitter Facebook



Related Articles



Enterprise Architecture
How to architect an organization.




Learn about common root causes of security risks.

Want to automate, monitor, measure and continually optimize your business? You might need BPM.

The 90 second version of TOGAF — a popular enterprise architecture framework.

What is the value of your EA project in 9 words or less?


Recently on Simplicable


8 Enterprise Architecture Risks

posted by Anna Mar
Enterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks?

Security Through Obscurity

posted by Anna Mar
Security through obscurity is generally considered a bad idea ...

Zombie Armies of The Digital Frontier

posted by Anna Mar
An quick explanation of botnets.

IT Security Guide

posted by John Spacey
A guide to information security including cheat sheets, best practices and checklists.

Sitemap













about     contact     sitemap     privacy     terms of service     copyright