Enterprise Mobile Management: 5 Trouble Spots
Here are five areas you should pay special attention to when it comes to mobile device governance, device access to enterprise data and BYOD.
The NIST recently released its first best practices for approaches to centralized mobile device management. It begins with developing basic but important threat models, which enterprises too often assume are already taken care of by in-house security initiatives or standing rules on mobile devices. NIST says to build out models for devices offered as part of the devices messaging service and a third-party offering that may work across different device brands. This foundation will help handle the necessary installation and upgrades of third-party mobile security applications that involve significantly more effort than with traditional computers and systems.
What good is mobile access if the data doesnt match up? This question is being overlooked among the many concerns during the buying spree of tablets and consumerization, writes Saugatuck Technology analyst Bruce Guptill. Integration is the glue that links these capabilities together and joins them to on-premises data assets in data centers where mission-critical money systems still operate behind highly secure firewalls.
Clay Richardson, analyst at Forrester Research, describes the gap with legacy optimization as follows: Unfortunately, todays business and technology leaders continue to respond to the mobile opportunity with the wrong answers. Business leaders respond to mobile with, Lets build a really slick mobile app, put it up on iTunes and were done! Technologists respond to mobile with, We need a strong BYOD policy and to put device management tools in place! Both of these responses completely overlook the fact that underlying legacy applications and business processes need optimizing for the mobile experience.
With devices that are sewn into the personal activities of users, enterprises have been slow with policies that curtail too much private info mixing with enterprise data and work expectations. ISACA found that 36 percent of businesses it polled either had no policy on personal activities on mobile devices or were unaware of one. The information systems professional group recommended immediate action by IT to monitor how these devices are connected to enterprise systems and at what times.
Along with the adoption of devices, more enterprises are hiring or contracting experts to get a real handle on network management. From a business perspective, that means there may be a smaller pool of adequate help to choose from, and and those pros will be in a position to demand greater compensation. IT staffing firm Robert Half Technology expects the number of network architects to grow by 22 percent over the next eight years. By 2013 alone, network and wireless engineers are expected to see an average jump in salary of 8 percent from current pay, the firm stated in its latest IT hiring assessment.
Click here for Information-Management.coms page dedicated to enterprise mobile trends, news and strategy.
All photos used with permission from ThinkStock.
There may be no trend changing the way we work more directly than enterprise mobility. Along with the benefits of having an agile workforce, there are unique disruptions regarding how to handle these new mobile extensions that are hitting business and tech leaders alike.
Hadoop as a Service: 18 Cloud Options
10 Big Data Software Requirements
15 Chief Data Officer Job Requirements
17 BI & Analytics Requirements: Gartner Magic Quadrant
Big Data: 14 Requirements for Real-Time Analytics
10 Chief Data Officer (CDO) Career Trends
Inside a Big Data Headquarters
10 Phrases That Kill Big Data Projects