8 Ways MDM Can Ease IT Pain - InformationWeek
IoT
IoT
Mobile // Mobile Applications
News
6/17/2015
01:20 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%
RELATED EVENTS
[Best Practices] Managing Multiple Clouds
Jul 26, 2017
Putting all your eggs in one cloud basket is risky, because clouds are not immune to denials of se ...Read More>>

8 Ways MDM Can Ease IT Pain

Mobile device management is more than a security tool. Here's how your IT organization can draw value from MDM.
Previous
1 of 10
Next

(Image: Samsung)

(Image: Samsung)

Over the past few weeks, I've talked with various organizations about the possibility of implementing mobile device management (MDM). To my surprise, many IT managers and CIOs didn't easily grasp the concept of MDM and what it can do for their organizations. I'm not sure if it's the name "mobile device" in MDM -- or that first iterations of MDM were slim on features -- but there seems to be a disconnect about what MDM can do and how it's perceived by IT professionals.

Most people I spoke with thought of MDM simply as a data-loss-mitigation tool for Bring Your Own Device (BYOD) environments that enables them to remotely wipe lost or stolen devices. And while this is true, MDM can do so much more. First of all, it's not strictly for BYOD scenarios. In fact, many MDM implementations I've been a part of did not allow for BYOD. Instead, the companies wanted a way to manage and secure company-owned devices.

Another misconception that I was surprised to hear was that MDM was only for mobile devices -- i.e., smartphones and tablets. This couldn't be further from the truth. While there are some benefits to using a modern operating system, such as iOS and Android, to squeeze a few more features out of an MDM, integration of desktop operating systems  has really picked up steam. In fact, every new desktop OS update and revision seems to add more MDM possibilities.

One last misconception is that MDM is strictly a security tool. In fact, most new features deal with easing the entire management of wireless devices. Automation is the name of the game here, and MDM can automatically identify devices that fall outside the bounds of corporate policies and instantly take action to patch, push, and eliminate any issues.

We're looking to eliminate the confusion surrounding what MDM can do for you. In our list, there are probably several features that you already know. We hope you'll learn one or two things you didn't know before, and by doing so gain a better understanding of the state of MDM capabilities and what they might be able to do for you in the future.

Once you've reviewed our list, tell us whether any of these features were a surprise to you. Or, if we missed a specific MDM capability that you think is an absolute game-changer, we want to know. Tell us all about it in the comments section below.

Andrew has well over a decade of enterprise networking under his belt through his consulting practice, which specializes in enterprise network architectures and datacenter build-outs and prior experience at organizations such as State Farm Insurance, United Airlines and the ... View Full Bio

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kstaron
50%
50%
kstaron,
User Rank: Ninja
6/24/2015 | 10:32:34 AM
single use?
I found the idea of geo-fencing fancinating, but turning a device into a single use only smacks of treating employees like children instead of professionals. Unless you are hiring teenagers that are more likely to text and watch youtube than do their jobs is locking a device really needed?
shamika
50%
50%
shamika,
User Rank: Ninja
6/18/2015 | 3:46:01 AM
MDM
This is an interesting article. I think most of the IT companies have to gone to the extent of having MDM in their company. However I think there is an increasing trend for it.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll