Tablet Deployment in Business: Security First
January 16, 2012
By TMCnet Special Guest
, Director at MOBI Wireless Management,
As we enter the age of tablet computing, businesses are increasingly deploying tablet devices into their company’s wireless environment. From sales support to customer presentations to any number of business-related duties, the tablet provides a useful tool for corporate operations—a tool that also requires careful thought and consideration before being freely deployed in the workplace. Two components that deserve careful consideration when incorporating the use of tablets in the workplace are security and device support.
Recent statistics from MOBI wireless management, a leading mobility management provider, revealed that while less than five percent of managed devices are tablets, nearly 10 percent of all help desk calls are tablet-related. With the relative youth of tablet devices in the wireless device market, IT teams who deploy and support tablet devices can expect an increased demand on their resources from the end-users.
Tablet Security & Data Control
When deploying a tablet device into a company’s wireless environment, security issues are of paramount concern—especially since tablets double as personal devices for most users. Companies must consider that business-related activity shares a home with personal activity like downloading and listening to music, surfing the web and storing pictures. Tablets are also connected through public WiFi (News - Alert), a factor that puts devices at high risk for security breaches because it can allow sensitive data to end up in a public arena and/or attract malware.
Although, not necessary for all enterprises, the most secure method for deploying tablets is by installing appropriate mobile device management (MDM) software that supports the tablet’s specific operating system. Through MDM software, companies can incorporate email and other business-critical information onto tablets securely. The applications allow all data to be encrypted, aligned with a company’s compliance policies and protected passwords. Companies can also remotely wipe sensitive data from a lost or stolen tablet before it gets into the wrong hands.
Ongoing IT Support
To ensure complete tablet security, a company’s IT staff must supply an adequate level of support for wireless solutions and MDM software. When it comes time to set-up, troubleshooting and ongoing management of the device, companies depend on internal resources or an outsourced IT team to be constantly present and knowledgeable. As many internal IT staffers can attest, companies often don’t account for such precautionary measures when adding tablets to their lineup of devices.
Mobility management companies are also an effective option to deploy tablet devices and manage the wireless program (plans, features, bill allocation, inventory, etc) on behalf of the internal IT staff. With outside help, a company’s IT staff can focus on other pressing IT issues and tasks without devoting extra time to challenging tablet devices and demanding end users.
Companies can certainly expect better-connected employees and increased productivity when tablets are deployed—however, they can also expect security and support to be of much greater concern. By focusing first and foremost on these elements, internal IT staffers and employees alike can reap the benefits of utilizing tablet devices in the work place.
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO East 2012, taking place Jan. 31-Feb. 3 2012, in Miami, FL. ITEXPO (News - Alert) offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. For more information on registering for ITEXPO registration click here.
Stay in touch with everything happening at ITEXPO. Follow us on Twitter.TMCnet publishes expert commentary on various telecommunications, IT, call center, CRM and other technology-related topics. Are you an expert in one of these fields, and interested in having your perspective published on a site that gets several million unique visitors each month? Get in touch.
Edited by Stefanie Mosca