The case for mobile device management

July 2012 Information Security

With a diversity of mobile devices such as smartphones and tablets proliferating companies at every level, monitoring and securing these devices, and managing the type of information that can be shared on them, both inside and outside the office, has become one of the biggest and most pressing challenges for businesses today.

Gartner has predicted that the consumerisation of IT will be the most significant trend affecting companies in the next decade. Yet, few companies in South Africa are prepared for dealing with the challenges associated with empowering worker mobility.

“In South Africa, few companies have a well-constructed strategy for managing mobile devices and CIOs and IT departments are often on the back foot as companies rush to deploy mobile devices, or allow employees to use their own for business purposes,” says Patrick Evans, CEO at Advanced Cloud Technologies. “When employees are able to use a choice of mobile devices, whether they are company-owned or their own, to do their work, it gives rise to a host of threats. Companies have to consider how to maintain visibility and control of these devices in order to mitigate these potential threats.

Patrick Evans
Patrick Evans

“This cannot happen haphazardly because there is too much to think about. Companies need to have a strategic approach to managing mobile devices in the enterprise and this must be supported by a robust and effective solutions infrastructure.”

Device security is probably the most pertinent business case for mobile device management (MDM). At a very basic level, companies will want to have the capability to wipe clean mobile devices that have been lost or stolen in order to protect any critical business information that may be housed on them. However, Evans says that mobile device management goes beyond just securing the device.

“There has been a revolution in the way that companies engage with their markets and companies are enthusiastically embracing bi-directional communications with their customers and their employees, as well as social networking. The mobile device is the centre of it all.

“To be effective in protecting the business against emerging threats arising from the pervasive use of mobile devices by savvy and highly-connected users, mobile device management must include corporate policy around what kind of information can be downloaded and shared with mobile devices; user validity; secure access; data loss prevention; regulatory and corporate compliance; and application control amongst others.”

The market is burgeoning with vendors offering mobile device management solutions that enable companies to address these aspects. Some of them are on-premise solutions and others are cloud-based. Historically, mobile device management has been done with on-premise solutions, but there is a move towards on-demand, cloud-based systems because they are more cost-effective and quicker to deploy.”

There are a number of applications that really lend themselves to the cloud and mobile device management is one of them. Opting for a cloud-based mobile device management solution is probably the easiest and most effective way for companies to gain visibility and control of a plethora of mobile devices while managing costs and enjoying access to qualified support.

“We anticipate a dramatic increase in the demand for cloud-hosted mobile device management solutions in South Africa as more companies scurry to implement a solution for managing mobile device threats. For those on the MDM journey for the first time, the cloud should be the first point of departure. Obviously, choosing the right provider and right technology is critical,” Evans says.

Cloud-based mobile device management is becoming a more viable option for companies in South Africa. Mobile device management technology from Zenprise, included in Gartner’s Critical Capabilities for MDM Report and described as “one of the more innovative platforms available”, is being delivered by local IT security company, Securicom, as a cloud-based service, in partnership with Blue Turtle Technologies (Blue Turtle) which has the rights to distribute the technology in South Africa.

With Zenprise MobileManager, companies can have complete visibility and control over device security from a secure, user-friendly management console. From the console, the company administrator can perform device compliance checks; block devices if they are unmanaged, lost or do not adhere to company blacklist or whitelist policy; monitor network traffic and user behaviour; block disallowed apps; identify mobile threats and compliance violations and enforce device security upgrades.

Evans concludes: “If you understand the relevance and importance of mobile devices in your organisation and you are ready to unlock the opportunities of limitless worker mobility, get a solid device management strategy in place, sooner rather than later.”

For more information contact Blue Turtle Technologies, +27 (0)11 206 5600, [email protected], www.blueturtle.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Kaspersky’s predictions for 2025 APT landscape
Information Security
The 2025 advanced persistent threat (APT) includes the rise of hacktivist alliances, increased use of AI-powered tools by state-affiliated actors – often with embedded backdoor – more supply chain attacks on open-source projects.

Read more...
SecurityHQ certified B-BBEE Level 1: Delivering global services from a local entity
SecurityHQ Information Security
SecurityHQ, a global managed security services provider (MSSP) with an office in South Africa, has announced it can now offer local companies a complete managed cybersecurity service from a Level-1 B-BBEE accredited and 51% black-owned service provider.

Read more...
2024, the year of Fraud-as-a-Service
Information Security
A report from AU10TIX outlines how ‘the industry’s dark engine’ offers user-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes.

Read more...
The future of endpoint security
Information Security
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. Endpoint security involves safeguarding devices connected to a network from a range of cyberthreats.

Read more...
Not enough businesses take cybercrime seriously
Information Security
Interpol recently revealed that cybercrime, specifically ransomware incidents, cost the South African economy up to 1% of the country’s GDP, while the Council for Scientific and Industrial Research estimated the loss at R2,2 billion a year.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...