CONTACT US
  • LinkedIn Social Icon
  • Facebook Social Icon
OUR OFFICES

Address: 14 Berkely Court  Markham Ontario Canada L3R 6M3 

Phone: 416-727-4417

Email:  rderouin@valadian.com

Address: 20436 Route 19, Suite 620, 256 Cranberry Twp, PA  16066

Phone: 724-765-0350

Email:  aweigand@valadian.com

© 2017 by VALADIAN

Please reload

Recent Posts

Firewalls Explained: 4 FAQs for Companies Looking to Make a Change

January 16, 2018

1/2
Please reload

Featured Posts

5 Ways to Find the EMM Solution That’s Right for You

November 17, 2017

 
In our last post, we discussed the cost, scale and frequency of mobile data breaches. Now we are exploring how to find an EMM solution that allows you to automate security compliance without intruding on the privacy of personal devices.
 

You already know how costly it can be to leave your mobile devices, apps and data open to cyber-attacks. But it’s not enough to instruct your employees about mobile data and device policies and expect them to abide. A recent survey from Dell found that 45% of respondents admitted to engaging in unsafe data sharing practices throughout the workday, including connecting to public Wi-Fi to access confidential information (46%), using personal email accounts for work (49%) or losing a company-issued device (17%).

 

IT and security professionals can’t afford to wait for employees to start listening — they need an effective program to secure and monitor mobile devices – or risk a security breach. But the sheer number of Enterprise Mobility Management (EMM) options, solutions and features can be overwhelming. That’s why we’ve come up with five key ways to find the EMM solution that is best for your organization.

  1. Define your strategy and requirements with the end in mind. Of course you should consider what’s necessary today to secure and manage your existing mobile devices, data, and applications. But it’s no longer enough to develop a policy and desired feature set that covers current apps and hardware. What devices are on the horizon? Are employees using wearable devices for work? This is uncharted territory for the majority of IT departments and still relatively new in general. Gartner predicts that 70% of mobile professionals will conduct their work on personal smart devices by 2018. That’s why you need a strategy and solution that are flexible and scalable. When considering what features you need, define your internal requirements before looking at specific solution feature lists. Think about how your employees are using their devices (and will be using devices in the future) – and what features are essential for those business tasks. That way, you begin a solution evaluation knowing what you do need and will not be distracted by the “latest-and-greatest” flashy features that you don’t need.

  2. Do your homework. As an IT or security professional, you are probably bombarded with emails, web ads and calls from EMM vendors, but it’s best to start with a blank canvas. Analyst firms like Gartner, Forrester and Aberdeen provide detailed solution overviews that can help you identify which solutions might work for you. User review sites, such as Gartner’s Peer Insights, can provide a glimpse into the life of a solution’s everyday users. Once you have a shortlist, customer testimonials and case studies on the vendor’s website will also help you pinpoint a solution that works well for organizations comparable to yours in terms of industry, size and mobility model.  

  3. Make it easy for end users and IT. Living up to the expectations of today’s users means understanding their devices and apps before you deploy an EMM solution. Survey employees – especially the mobile power users – about their needs and opinions. Ensure that key solution features, like self-enrollment and mobile application delivery, are simple, seamless and fast. The same goes for key management features – it should be easy to inventory, configure, secure and lock devices. After all, EMM is supposed to save you time, not add to your already heavy workload.  

  4. Balance security and privacy. If your mobility model is BYOD or Company Owned Personally Enabled (COPE), employees expect limited IT access to their personal devices, data and apps, even in the case of lost or stolen devices. Look for EMM solutions that allow you to separate – or containerize – corporate data and apps from personal ones. Through a secure, encrypted data container, you will be able to push, update, alter or wipe any business files without touching personal data.  

  5. Work with a trusted, experienced partner. Every EMM vendor will claim to be a partner on which you can rely to meet all of your mobility needs, which is why it can be helpful to have a neutral party help you through the process. Working with a consultant will not only reduce the stress of choosing the right solution, but also ensure that your decision is one that will result in a secure mobile environment and more productive (and satisfied) mobile employees.

At Valadian, we've been helping our clients maximize the potential of enterprise mobility for years.  Call us anytime.

 

Tags:

Share on Facebook
Share on Twitter
Please reload

Follow Us
Please reload

Search By Tags