Take our FREE 30-Day Trial with no obligation required.
Experience for yourself why MaaS360 is a leader in MDM Solutions.
Fill out your information below to start.
Your email and personal information are confidential, and will not be sold or rented.
Click here to hide
MaaS360 by Fiberlink
MaaS360 MDM eBook
Below is the beginning of the eBook entitled "Mobility Device Management: Your Guide to the Essentials and Beyond". Take a look. If you like what you see, fill out the form and download a free copy in PDF format.
Mobile Device Management: Your Guide to the Essentials and Beyond
Learn best practices for Mobile Device Management in this easy to follow eBook. The first few pages, including the table of contents, appear below. Click the button below to download a full version.
Mobile Devices Are All Around You
More businesses than ever are confronting how to fully embrace mobile devices beyond their executive and sales teams. In a way, IT teams are being dragged into this. Many users have fully incorporated smartphones and tablets into their daily lives thanks to devices and operating systems from Apple and Google. They are choosing the personal user experience of Android and iPhone over the largely business-task-driven BlackBerry devices. They have also adopted application stores in their personal lives, blending activities like web browsing, games, and mobile payments with business uses such as corporate email.
So why is it taking so long for businesses to officially assimilate mobile devices into their organizations? It's usually because they want to put an IT strategy for management and operation in place first. We understand that IT would like to add a degree of rigor, but the solution doesn't have to be that difficult.
This guide describes twelve best practices for Mobile Device Management (MDM). The first eight principles are the essentials that every organization needs to adopt. The last four are advanced practices that will help take your organization to the next level.
The Essentials: Start with a Strong Foundation
Regardless of your business, industry or users, be sure to adopt the following practices:
1. Be Realistic with Your Policy 2. Gain Insight into Who's Mobile and What They're Doing 3. Cover the Basics: Passwords, Encryption, and Remote Wipe 4. It's as Easy as 1, 2, 3 5. Make it Simple to Get Up and Running 6. Let End Users Take Care of Device Management 7. Start Planning for Centralized Control 8. Spread the Word about Your Progress
Advanced Practices: Build Upon Your Foundation
Go a step further with advanced practices:
9. Get a Grip on Usage Costs 10. Automate Compliance Management 11. Manage Application Restrictions and Your Own Application Storefront 12. Provide a Backup & Recovery Service
1. Be Realistic with Your Policy
You need to:
1. Support multiple device platforms 2. Allow personal devices
Frankly, nearly all organizations are doing this now. They just don't know it. Chances are good that your business has a BlackBerry corporate standard, right? And that your business has at least one iPhone or iPad that syncs to your email infrastructure (most likely for the CEO or president) using Exchange ActiveSync® or Lotus Notes Traveler®.
If that's the case, you probably have a lot more personal iOS, Android and Windows Mobile devices inside your organization. After all, it's easy for any mobile device to integrate with mail infrastructure like Exchange using the Activesync functionality you turned on. Just Google Setting up iPhone on Exchange and see how your employees are doing it.
2. Gain Insight into Who's Mobile and What They're Doing
Making decisions and quantifying risks about mobile devices is hard without good data on the mobile devices in your environment. For instance, it's not uncommon for terminated employees to still be using corporate mobile devices—but you can't stop this unless you know about it.
With a lightweight reporting and inventory tool, you can keep tabs on how mobile devices are being used and by whom. Make sure the solution:
Empowers the helpdesk to troubleshoot devices
Is accessible outside of IT (for example, HR should have access during exit interviews to turn off devices for employees who are leaving the company)
Includes strong application inventory and search capabilities
This is just the beginning! Click on the button below to continue reading sections 3 - 12.