Beruflich Dokumente
Kultur Dokumente
437021026
Group No.: 4
Al Imam Mohammad Ibn Saud Islamic University
College of Computer and Information Sciences
Information Systems
Department
437021026
Group No.: 4
Table of Contents
Introduction............................................................................................................
Mobile devices in the enterprise..............................................................................
How to Control of the BYOD?....................................................................................
Benefits of BYOD:....................................................................................................
Risks of BYOD:........................................................................................................
Solving the Security issues:.....................................................................................
What should we do?................................................................................................
Mobile device diversity management........................................................................
Cross Mobile Platform Development Tool..................................................................
MDM and Cross Platform Development...................................................................
Mobile Device Management (MDM).........................................................................
MDM Technologies.................................................................................................
Benefits of Mobile Device Management...................................................................
References............................................................................................................
1.Introduction
Traditionally, enterprise network and system administrators have always
managed identical groups of client devices. The process of planning and
provisioning network clients almost exclusively dealt with desktop
computers. Which simplified the deployment and management of the
network infrastructure, client hardware and applications, and help to
ensuring uniformity across all network devices.
However, the emergence of smartphones and tablets have taken the
world of consumer electronics, and change the world lifestyle and add
new ways to do the work, the number and statistics Estimate it that in
the next five years, the number of mobile devices will be about 10
billion 1.5 for every man, woman and child on the planet. With mobile
devices, increasingly embedded into all parts of our personal lives,
enterprises also finding that their employees increasingly want to use
their own personal mobile devices to conduct work.
So, Enterprises enforced to provide a broad access to the enterprises
resources but they should to ensure the appropriate security
management and controls are in place.
What is BOYD?
BYOD (bring your own device) means that employees are using many
different types of personal devices to store and process enterprise data,
and connect to enterprise networks. The problem is that many
smartphones are not being managed as secure devices, and as the
reports shows that less than one out of five devices had anti-malware
and only half encrypt the contained date.
BYOD significantly affect the traditional security model of protecting the
perimeter of the IT organization by blurring the definition of that
perimeter, both in terms of physical location and in asset ownership.
With personal devices now being used to access corporate email,
calendars, applications and data; many organizations are struggling
with how to define the impact of BYOD to their security status and
establish appropriate procedures and support models that help to
balance both their employees needs and their security concerns.
So, giving the employees the advantage of using devices they're
comfortable with may help enterprises to reduce the expense of
purchasing separate equipment for company use, However
organizations need effectively manage the diverse devices that will
come with BYOD and protect their data from being compromised and
there are different system and applications that help to manage this
diversity which we will mention it later in Mobile device diversity
management.
4.
5.Benefits of BYOD:
The integration of smartphones and tablets in enterprise workflows has
different advantages as shown in next figure, regardless of whether they
are centrally deployed or brought in by employees, bellow we will
explain some of these benefits:
- Enterprise devices and applications often have a higher barrier to entry with
regards to usability, whereas consumer technology has often been
engineered to provide a level of familiarity to end users.
This reduces the learning curve for employees, allowing them to quickly
get used to company issued devices.
Call Log Each approaching and active number is logged along with
duration and time stamp.
SMS (Text Messages) Log Every text message is logged even if the
phone's logs are deleted. Includes full text.
GPS Locations Log GPS positions are exchanged at general intervals
with a connection to a guide. Contacts Every contact on the phone is
logged. New contacts exchanged at general. Tasks all individual tasks
that are created are logged and viewable.
Cell ID Locations ID data on all cell towers that the device goes into
scope of is recorded. E-Mail Log all inbound & outbound email activity
from the essential email account is recorded. Calendar Events every
calendar event is logged. Date, time, and locations are recorded.
URL (Website) Log all URL website addresses visited using the phone's
browser are logged.
Photo & Video Log all photos & videos taken by the phone are recorded
& are viewable.
Restrict the access that mobile devices owned by your employees have,
and limit the files/documents that they can reach. For example, you may
have sensitive data that employees will more than likely not need to
access whilst theyre commuting or on a portable device.
3. Block undesirable apps from being downloaded
You can wipe all corporate data remotely from a mobile device. This
means that if an employee loses their mobile device or if they leave the
company, all sensitive app data can be deleted and if the mobile
device is found, content can easily be restored.
5. Remotely lock down the app until the device can be fixed
You can essentially block the app ensuring that no unwanted users have
access through it. This prevents any data being lost or corrupted.
6. Implement a login system that ensures the account
belongs to a valid employee
The main benefit of enterprise app stores is that they ensure apps can
only be downloaded by people who are given access, often employees.
Using an enterprise app store rather than the public app stores also
means that apps are not subject to the public app stores guidelines for
submission and approval times, that can take as long as 15 days for
Apple.
MDM Technologies
After investigating the MDM market; the most popular suppliers were
selected for further investigation. In this process, large numbers of MDM
providers were discovered. 36 of them that are more capable in todays
market. Some of them are listed as the following table:
Being able to manage users and their devices remotely are huge
benefits of mobile device management. By remotely monitoring and
managing your mobile devices, you can guarantee the security and
health of all mobile devices connected to your network 24/7.
Additionally, having remote control over mobile devices provides the
ability to remotely disconnect or disable any unauthorized users or
applications.
Application Control
With all the benefits of mobile device management allow you to be able
to accept mobile devices, and the increased worker productivity they
provide, into your organization without worrying about whether or not
you are compromising your data or security.
Conclusion
References
Collar, A. (2015, 07 30). 7 Benefits of Mobile Device Management. Retrieved
from Orion Technology Services : http://www.oriontech.com/7-benefits-
of-mobile-device-management/
EYGM Limited. (2013, 09). Bring your own device - Security and risk
considerations for your mobile device program. Retrieved from
www.ey.com: http://www.ey.com/gl/en/issues/insights
G DATA Software AG . (n.d.). Mobile Device Management . Retrieved from G
DATA Software AG:
https://file.gdatasoftware.com/web/en/documents/techpaper/G_DATA_Te
chPaper_Mobile_Device_Management_English.pdf
Majdi, E. B. (2013). EVALUATION OF MOBILE DEVICE MANAGEMENT TOOLS
AND ANALYSING INTEGRATION MODELS FOR MOBILITY ENTERPRISE.
Ume, Sweden: Ume University.
Terry, R. (2015, 03 23). Top 7 Risks of Enterprise Mobility. Retrieved from
Symantec Official Blog: https://www.symantec.com/connect/blogs/top-7-
risks-enterprise-mobility-1