Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
ENTERPRISE MOBILITY
MANAGEMENT AND ITS
CHALLENGES
An Academic presentation by
Dr. Nancy Agens, Head, Technical Operations,
Phdassistance Group www.phdassistance.com
Email: info@phdassistance.com
TODAY'S DISCUSSION
Outline Introduction
Stages of Enterprise Mobility Management
Enterprise Policies
Device Strategies
Challenges for Implementing Enterprise Mobility Management
Introduction
There are various management schemes for managing the devices and one of the
most popular schemes is Enterprise Mobility Management (EMM).
This scheme includes several mobile solutions including the solutions for mobile
data to voice plans and mobile applications.
Thus it has been asserted that EMM can be envisioned as an inseparable part of
enterprise mobility ecosystem.
EMM augments the productivity of users consequently proving to be more beneficial for
the enterprises
EMM includes Mobile Content Management, Mobile Billing Management, Mobile Device
Management, Mobile Application Management etc.
Stages of Enterprise Mobility Management
There are primarily three main stages of enterprise mobility management.
PLANNING/STRATEGIES FORMULATION:
The essential step of enterprise mobility management is to define or plan suitable
enterprise policies that emphasize on security and management of the devices.
PRODUCT/SOLUTION:
As per the type of business of an enterprise, they employ a suitable catalyst for
designing their products.
PRODUCT/SERVICE MANAGEMENT:
Finally, after planning, designing and implementing the strategies, management of the
products is considered.
Contd..
Figure 1: Stages of
enterprise mobility
management
Figure 2: Enterprise
mobility management
Enterprise Policies
Before delivering any product enterprise formulates different policies which are of
paramount significance as far as security management is concerned.
Some of the popular security mechanisms are:
Data encryption support
Secure communication protocol
These security mechanisms can be enabled through the following ways:
Firewall protection
Implementing password
Virtual private network etc.
Device Strategies
1. BRING YOUR OWN DEVICE (BYOD):
The users are allowed to bring their personal devices for enterprise applications.
The enterprises need to implement well defined policies and security management.
2. CHOOSE YOUR OWN DEVICE (CYOD):
This approach enables the users to use their tools that are permitted by the enterprises.
Similar to BYOD the approach also requires well- defined security mechanisms.
3. CORPORATE OWNED PERSONALLY ENABLED DEVICE (COPE):
This strategy is generally preferred by the enterprises due to higher data and information
security offered by it to the enterprises.
Challenges on Implementing Enterprise
Mobility Management
1. FRAGMENTATION:
The BYOD policy should clearly define what can be done with the device as far as the
applications and information of enterprise are concerned.
Mobility management has been perceived as one of the most common challenges of
current enterprises.
2. Integration:
To make EMM successful, it is necessary that different enterprises and mobility solutions
should be combined which is a complex process.
Contd..
Though integration of devices would facilitate proper sharing of critical data, it would
also increase the complexity and cost.
3. LIFECYCLE MANAGEMENT:
Managing the lifecycle of applications and devices has been described as one of
the most significant challenges for enterprises.
A broad mobility lifecycle can bring organization to a vulnerable state.
4. DEVICE THEFT/LOSS:
The devices varying in capacity from 64GB to 128 GB imposes a threat concerning
the amount of data that can be stolen, lost or hacked.
Thus it is not possible to achieve complete security against theft.
Contd..
There should be some rules for controlling the damage that occurs when such a
condition takes place.
5. COMPLIANCE:
The regulations and compliances necessitate that the company should have
complete knowledge about the flow of its data and the people who are using it.
It is not possible to map the data flow and have knowledge about confidential
information, especially when there are several mobile devices.
To alleviate this issue enterprises are now implementing an approach called mobile
device management.
Contact Us
UNITED KINGDOM
+44-1143520021
INDIA
+91-4448137070
EMAIL
info@phdassistance.com

More Related Content

Enterprise Mobility Management and its Challenges - Phdassistance.com

  • 1. ENTERPRISE MOBILITY MANAGEMENT AND ITS CHALLENGES An Academic presentation by Dr. Nancy Agens, Head, Technical Operations, Phdassistance Group www.phdassistance.com Email: info@phdassistance.com
  • 2. TODAY'S DISCUSSION Outline Introduction Stages of Enterprise Mobility Management Enterprise Policies Device Strategies Challenges for Implementing Enterprise Mobility Management
  • 3. Introduction There are various management schemes for managing the devices and one of the most popular schemes is Enterprise Mobility Management (EMM). This scheme includes several mobile solutions including the solutions for mobile data to voice plans and mobile applications. Thus it has been asserted that EMM can be envisioned as an inseparable part of enterprise mobility ecosystem. EMM augments the productivity of users consequently proving to be more beneficial for the enterprises EMM includes Mobile Content Management, Mobile Billing Management, Mobile Device Management, Mobile Application Management etc.
  • 4. Stages of Enterprise Mobility Management There are primarily three main stages of enterprise mobility management. PLANNING/STRATEGIES FORMULATION: The essential step of enterprise mobility management is to define or plan suitable enterprise policies that emphasize on security and management of the devices. PRODUCT/SOLUTION: As per the type of business of an enterprise, they employ a suitable catalyst for designing their products. PRODUCT/SERVICE MANAGEMENT: Finally, after planning, designing and implementing the strategies, management of the products is considered. Contd..
  • 5. Figure 1: Stages of enterprise mobility management Figure 2: Enterprise mobility management
  • 6. Enterprise Policies Before delivering any product enterprise formulates different policies which are of paramount significance as far as security management is concerned. Some of the popular security mechanisms are: Data encryption support Secure communication protocol These security mechanisms can be enabled through the following ways: Firewall protection Implementing password Virtual private network etc.
  • 7. Device Strategies 1. BRING YOUR OWN DEVICE (BYOD): The users are allowed to bring their personal devices for enterprise applications. The enterprises need to implement well defined policies and security management. 2. CHOOSE YOUR OWN DEVICE (CYOD): This approach enables the users to use their tools that are permitted by the enterprises. Similar to BYOD the approach also requires well- defined security mechanisms. 3. CORPORATE OWNED PERSONALLY ENABLED DEVICE (COPE): This strategy is generally preferred by the enterprises due to higher data and information security offered by it to the enterprises.
  • 8. Challenges on Implementing Enterprise Mobility Management 1. FRAGMENTATION: The BYOD policy should clearly define what can be done with the device as far as the applications and information of enterprise are concerned. Mobility management has been perceived as one of the most common challenges of current enterprises. 2. Integration: To make EMM successful, it is necessary that different enterprises and mobility solutions should be combined which is a complex process. Contd..
  • 9. Though integration of devices would facilitate proper sharing of critical data, it would also increase the complexity and cost. 3. LIFECYCLE MANAGEMENT: Managing the lifecycle of applications and devices has been described as one of the most significant challenges for enterprises. A broad mobility lifecycle can bring organization to a vulnerable state. 4. DEVICE THEFT/LOSS: The devices varying in capacity from 64GB to 128 GB imposes a threat concerning the amount of data that can be stolen, lost or hacked. Thus it is not possible to achieve complete security against theft. Contd..
  • 10. There should be some rules for controlling the damage that occurs when such a condition takes place. 5. COMPLIANCE: The regulations and compliances necessitate that the company should have complete knowledge about the flow of its data and the people who are using it. It is not possible to map the data flow and have knowledge about confidential information, especially when there are several mobile devices. To alleviate this issue enterprises are now implementing an approach called mobile device management.