The Layered Security Approach to Mobile Device Management
August 22, 2013
By Susan J. Campbell
, TMCnet Contributing Editor
Mobility is an important part of any good corporate strategy, but how can IT ensure users have the flexibility they need while also protecting the network? This is a common question asked on a seemingly daily basis in the corporate sector. Enabling employees to access information on the go is a growing need. At the same time, providing additional portals that put the network at risk is not high on the list of wants.
For this reason, IT administrators are increasingly adopting mobile device management solutions. Mobile device management enables those responsible for the protection of the network to maintain control over access to that network. It also provides the transparency needed to understand what users are doing when mobile. At the same time, they can support policies put in place to guide the proper usage of the device.
Mobile device management is a popular tool whether the company has adopted a Bring Your Own Device strategy or not. It’s a nice medium between the control IT still needs to have and the flexibility and access users demand. Likewise, it also addresses the security concerns that seem to be top of mind for any professional promoting the use of mobile devices for access to the corporate network through the public Internet.
This is where MobileIron stands out in the crowd. The mobile device management solutions provider offers a Layered Security model so that users have the flexibility they need without sacrificing the security of the network. The solution aims to provide the experience mobile was created to produce. Users (and their supervisors) enjoy increased productivity and access to the tools they need while on the go.
Layered Security addresses a number of different elements in the mobile experience. First, it protects the enterprise persona, or the collection of settings, information, applications and data on the employee’s mobile device. It effectively aligns with the user’s behavior to protect that data. It thereby preserves the native user experience and enables a trusted app ecosystem so the user has access to the services he or she needs.
This model allows for policy enforcement, such as passwords, encryption and lost device protection; posture and trust, granting IT complete visibility to understand the use and risk at any given moment; OS security to alert when the integrity of the operating system has been compromised; closed loop compliance; and data containerization, so information is protected against unauthorized access and distribution.
For the user, this model ensures their identify is always known, that information is secured through approved channels and trusted networks, that access to information is controlled and that app-to-app communication is secure. At the same time, privacy controls are obvious so as to avoid handicapping the user.
The main point is to ensure the protection of the network while enabling the user the flexibility and access they need to be productive and efficient. With MobileIron’s mobile device management capabilities, the corporation really can have the best of both worlds.
Edited by Blaise McNamee