Management vendors race to help move BlackBerry users to Android and iOS
BlackBerry's decision to remain a public company increases the uncertainty their customers feel, according to Good Technology
IDG News Service - Mobile management vendors like Good Technology and MobileIron are increasing efforts to pitch Android and iOS as alternatives to BlackBerry, thanks to improved security and management tools.
On Monday, BlackBerry announced it had abandoned plans to sell itself and will instead take a $1 billion loan from a consortium involving shareholder Fairfax Financial Holdings. The company is also getting a new leader in former Sybase CEO John Chen, who joins the company as chairman and interim CEO.
While the deal buys BlackBerry more time and a CEO who knows enterprise mobility, it still faces many challenges, and CIOs need to plan for all possibilities. IT faces additional pressure from employees who want to use a wider variety of devices.
"BlackBerry's decision to remain a public company increases the uncertainty their customers feel. It is accelerating the need to develop long-term mobility strategies that account for new mobile platforms," said Jeff McGrath, senior director of product marketing at Good Technology, via email.
Good is one of the companies looking to benefit from BlackBerry's misfortunes, helping enterprises cope with multi-OS environments and implement bring your own device programs.
Recently it launched consultancy services aimed at enterprises that want to migrate. The company's core offering is Good for Enterprise, which, for example, secures email and browser access with Common Criteria EAL-4+ certification and FIPS 140-2 validated encryption for iOS and Android. The platform is compatible with Windows Phone, as well.
Competitor MobileIron also wants a piece of the pie, and on Wednesday it announced a release of its Android package. The company has worked with Divide, previously Enterproid, to offer native email, contacts and calendar functions. All content is encrypted and stored in a secure container on the mobile device. It too now has FIPS 140-2 validated encryption, MobileIron said.
MobileIron has also integrated its management software with Samsung Electronics' Knox platform, and made it possible to protect IBM's Notes Traveler client for Android.
Even though the competition has improved, replacing BlackBerry's integrated device management functionality and excellent security is a tall order. The company is still the gold standard when it comes to mobile security, according to Ovum analyst Richard Absalom.
Depending on the level of security needed, different measures are required, from regular mobile device management to platforms that can separate enterprise apps from the rest of the OS, said Leif-Olof Wallin, research vice president at Gartner.
Successfully migrating from a BlackBerry to a multi-OS mobile environment involves a combination of thoughtful planning and proper execution, according to MobileIron. As always, a good place to start is to find out what employees are really using and what they want to use, Absalom said.
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Enterprise Mobility Management Checklist Read this checklist for tips and considerations when creating your own Enterprise Mobility Management (EMM) strategy.
- Client Management: Simplifying Life for System Admins Watch this brief webinar to hear how implementing a client management strategy not only overcomes common Apple-ization challenges related to data protection &...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Mobile Device Management White Papers | Webcasts