Resource Center

Enterprise Mobile Management: 5 Trouble Spots

Here are five areas you should pay special attention to when it comes to mobile device governance, device access to enterprise data and BYOD.

Assumption on Security Assumption on Security

The NIST recently released its first best practices for approaches to centralized mobile device management. It begins with developing basic but important threat models, which enterprises too often assume are already taken care of by in-house security initiatives or standing rules on mobile devices. NIST says to build out models for devices offered as part of the device’s messaging service and a third-party offering that may work across different device brands. This foundation will help handle the necessary installation and upgrades of third-party mobile security applications that involve “significantly more effort” than with traditional computers and systems.

Integration Disconnect Integration Disconnect

What good is mobile access if the data doesn’t match up? This question is being overlooked among the many concerns during the buying spree of tablets and consumerization, writes Saugatuck Technology analyst Bruce Guptill. “Integration is the glue that links these capabilities together and joins them to on-premises data assets in data centers where mission-critical money systems still operate behind highly secure firewalls.”

Unprepared Legacy Systems Unprepared Legacy Systems

Clay Richardson, analyst at Forrester Research, describes the gap with legacy optimization as follows: “Unfortunately, today’s business and technology leaders continue to respond to the mobile opportunity with the wrong answers. Business leaders respond to mobile with, ‘Let’s build a really slick mobile app, put it up on iTunes and we’re done!’ Technologists respond to mobile with, ‘We need a strong BYOD policy and to put device management tools in place!’ Both of these responses completely overlook the fact that underlying legacy applications and business processes need optimizing for the mobile experience.”

Too Much (Personal) Information Too Much (Personal) Information

With devices that are sewn into the personal activities of users, enterprises have been slow with policies that curtail too much private info mixing with enterprise data and work expectations. ISACA found that 36 percent of businesses it polled either had no policy on personal activities on mobile devices or were unaware of one. The information systems professional group recommended immediate action by IT to monitor how these devices are connected to enterprise systems and at what times.

Network Help on Hold Network Help on Hold

Along with the adoption of devices, more enterprises are hiring or contracting experts to get a real handle on network management. From a business perspective, that means there may be a smaller pool of adequate help to choose from, and and those pros will be in a position to demand greater compensation. IT staffing firm Robert Half Technology expects the number of network architects to grow by 22 percent over the next eight years. By 2013 alone, network and wireless engineers are expected to see an average jump in salary of 8 percent from current pay, the firm stated in its latest IT hiring assessment.

For more on enterprise mobility … For more on enterprise mobility …

Click here for’s page dedicated to enterprise mobile trends, news and strategy.
All photos used with permission from ThinkStock.

There may be no trend changing the way we work more directly than enterprise mobility. Along with the benefits of having an agile workforce, there are unique disruptions regarding how to handle these new mobile extensions that are hitting business and tech leaders alike.


Please note you must now log in with your email address and password.