Slideshow Enterprise Mobile Management: 5 Trouble Spots

Published
  • October 18 2012, 10:41am EDT

Here are five areas you should pay special attention to when it comes to mobile device governance, device access to enterprise data and BYOD.

Assumption on Security

The NIST recently released its first best practices for approaches to centralized mobile device management. It begins with developing basic but important threat models, which enterprises too often assume are already taken care of by in-house security initiatives or standing rules on mobile devices. NIST says to build out models for devices offered as part of the device’s messaging service and a third-party offering that may work across different device brands. This foundation will help handle the necessary installation and upgrades of third-party mobile security applications that involve “significantly more effort” than with traditional computers and systems.

Content Continues Below


Integration Disconnect

What good is mobile access if the data doesn’t match up? This question is being overlooked among the many concerns during the buying spree of tablets and consumerization, writes Saugatuck Technology analyst Bruce Guptill. “Integration is the glue that links these capabilities together and joins them to on-premises data assets in data centers where mission-critical money systems still operate behind highly secure firewalls.”

Unprepared Legacy Systems

Clay Richardson, analyst at Forrester Research, describes the gap with legacy optimization as follows: “Unfortunately, today’s business and technology leaders continue to respond to the mobile opportunity with the wrong answers. Business leaders respond to mobile with, ‘Let’s build a really slick mobile app, put it up on iTunes and we’re done!’ Technologists respond to mobile with, ‘We need a strong BYOD policy and to put device management tools in place!’ Both of these responses completely overlook the fact that underlying legacy applications and business processes need optimizing for the mobile experience.”

Too Much (Personal) Information

With devices that are sewn into the personal activities of users, enterprises have been slow with policies that curtail too much private info mixing with enterprise data and work expectations. ISACA found that 36 percent of businesses it polled either had no policy on personal activities on mobile devices or were unaware of one. The information systems professional group recommended immediate action by IT to monitor how these devices are connected to enterprise systems and at what times.

Content Continues Below


Network Help on Hold

Along with the adoption of devices, more enterprises are hiring or contracting experts to get a real handle on network management. From a business perspective, that means there may be a smaller pool of adequate help to choose from, and and those pros will be in a position to demand greater compensation. IT staffing firm Robert Half Technology expects the number of network architects to grow by 22 percent over the next eight years. By 2013 alone, network and wireless engineers are expected to see an average jump in salary of 8 percent from current pay, the firm stated in its latest IT hiring assessment.

For more on enterprise mobility …

Click here for Information-Management.com’s page dedicated to enterprise mobile trends, news and strategy. All photos used with permission from ThinkStock.