Enterprise Mobility Management Minimization of security risks

After almost an entire year has been shaped by the pandemic, far-reaching effects on society and the economy are discernible.

Companies in particular have significantly strengthened and promoted digitization. Developments in the digital area that were neglected for a long time are now given top priority and are being pursued with vigor.

At the same time, of course, many companies are faced with major IT security challenges. After all, customer and company data must continue to be protected, even if the workforce mainly works from home. To ensure this, enterprise mobility management is particularly important.

Use of end devices in the company

Switching quickly from the office to the home office has overwhelmed many companies. But at the latest now, when it has long since become apparent that the exceptional situation will have to be maintained for longer or in some cases even bring advantages, a clear strategy is required in companies.

EXTRA: 5 tips on how to work safely in the home office [+ checklist]

In the absence of alternatives that could be organized quickly, the motto was simply “Bring your own device” (BYOD). Unless they already have company devices, employees should simply use their own smartphones, notebooks and tablets and establish access to company data there.

A variant that can be implemented quickly, especially since the workforce is already familiar with the devices, but in the medium term it involves many difficulties and also security risks.

Because on the one hand, the company’s IT usually cannot simply create a sufficient security architecture on the third-party devices to protect company data. On the other hand, the standardization of IT processes is also more difficult, since not only different programs and operating systems are used on the devices used, but also different versions.

Private apps and programs that are already installed can also cause incompatibilities, but they can also be infected with Trojans and viruses. Companies that want to protect their data should therefore not rely on this strategy in the long term.

Security through MDM and MAM systems

If you want to rely on mobile working and working from home in the long term, the IT department usually recommends an MDM or MAM strategy.

With Mobile Device Management (MDM), all mobile devices are controlled and managed from a central point, ideally the IT department. In this way, many security holes can be eliminated.

With Mobile Application Management (MAM), the company’s own software is played on the end devices.

The IT technicians thus have far more opportunities to influence the security architecture by installing updates directly on the end devices, installing firewalls and securing data in other ways.

Corporate IT hosting

Even if a system for the central management of devices and applications has been rolled out, the question still remains as to where this data and software should be managed and stored in a central location.

When it comes to the location of the company server, a basic distinction can be made between on-premise hosting and cloud hosting.

With on-premise hosting, the company’s servers are located at the company’s own location. This brings full control over it as an advantage, but at the same time all obligations in terms of maintenance, security updates and generally also the spatial and physical security of the server rooms.

Cloud hosting, on the other hand, is particularly suitable for small and medium-sized companies. The servers are not located at the company location, but with a hosting provider. This hosts the servers of several companies, which also ensures better and professional security and reliability than if each company had to organize these resources itself.

The decision therefore also depends on the size of the company and the respective situation.

Leave a Reply

Your email address will not be published.