Mobile management morphs
The software now goes way beyond controlling physical devices.
Computerworld - Ask any three IT professionals what they're looking for in mobile-device management (MDM) software and you're likely to get five different answers. Customers are pushing the limits of the software -- asking it to do many more things than it was originally created to do -- and vendors are happy to oblige.
For instance, when senior enterprise engineer Jeff Roman went looking for software to manage a mix of 3,000 smartphones at construction management firm Skanska, his top three priorities were ease of use, hardware security and cost -- in that order. On the other hand, for Arun Abraham, director of network service at publisher Scholastic, the issue was asset management. "I need to know all devices that are active and polling our servers at any time," he says.
Julian Bond, head of information, communication and technology at U.K.-based window blinds maker Hillarys Blinds, needed to control and manage the user experience for 1,000 external sales representatives equipped with Samsung Galaxy S IIIs. This included the ability to put a "walled garden" around critical applications on each sales adviser's device and to troubleshoot issues with Bluetooth-connected receipt printers on the fly.
When Computerworld surveyed IT managers for this story, 78% said they are using or plan to use mobile management software for basic hardware device management, while 68% mentioned security and 59% checked mobile application management.
But many are looking for additional features in areas such as network management (33%) and content management (27%), too.
So how do IT organizations choose? By finding tools that offer the right mix of features and then carefully testing to make sure those features work as advertised, IT managers say.
These days, mobile device management tool vendors need to be all things to all people for all mobile platforms, and they're responding. [See the chart.] Eventually, analysts say, MDM software will converge with more traditional software for managing PCs and laptops, providing a single control point for managing and implementing policies across all endpoint devices.
As enterprise apps continue to expand onto mobile, users will expect a consistent experience -- and a single help desk resource that can remedy application issues, whether the app is running in the cloud, on a desktop PC or on an iPhone.
Sorting through the options
All MDM software supports the basic hardware management functions available through Android and iOS APIs, but many vendors now support extended management API sets. One example is Samsung for Enterprise (Safe), which adds features such as the ability to disable Wi-Fi and Bluetooth connectivity and to manage Bluetooth-connected devices such as printers.
Many tools also now enable automated provisioning and provide a protected space within which enterprise apps and data can reside. Many have also added network management features such as usage monitoring and reporting, and the ability to restrict downloads to Wi-Fi connections in a bid to control cellular data and roaming costs.
- Three Best Practices to Help Enterprises Overcome BYOD Challenges The new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges,...
- 3 Keys to Secure BYOD Deployment The new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges,...
- Developing a Winning Mobile Strategy: Playing Offense vs Defense Don't lose time and money with a "throw an app against a wall to see if sticks" approach to mobile. You need a...
- BYOP: How Mobile and Social Are Creating New User Personas The digital world of mobile + social creates new customer segments and behaviors. Companies need to reorient their customer interactions around these segments...
- Client Management: Simplifying Life for System Admins Watch this brief webinar to hear how implementing a client management strategy not only overcomes common Apple-ization challenges related to data protection &...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Mobile Device Management White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!