When choosing an enterprise mobility management (EMM) solution, there are many factors to consider. Is it really secure, or does it just provide the illusion of security?

Can it support your future apps or just a subset? Does it work for all your users and stakeholders or are there limitations around devices or ownership models? Can you get up and running today or is this going to be a major IT project? Is it cloud-based, on-premise or does it support either? Here are some guiding principles to get you started.

1. Mitigate the risk of data and credential loss

  • Protect the keys to the kingdom – user credentials to access Exchange and corporate networks.
  • Train your commonly targeted employees such as admins and PR staff to be especially on guard.
  • Protect against credential theft and other threats that mobile device management alone does not address, even on devices with a PIN.
  • Guard against sensitive customer data leakage through sales turnover.
  • Respond to the threats posed by malicious interests who target executives traveling overseas.
  • Understand your employee base and realize that every employee represents a potential vulnerability.

2. Protect your organisation with multiple levels of security controls

  • Protect corporate applications on the device from leaking enterprise data outside of IT control, with policy-based app controls.
  • Secure enterprise data as it travels to and from the devices with encryption for data in motion.
  • Ensure security between apps on the device by ensuring inter-app communication is secured and encrypted.
  • Manage device-level security policies, like passcode lock and remote management.
  • Provide a secure cloud file share solution for sales, marketing, legal and other key teams.
  • Utilise a solution with layered security that protects at every level: apps, data, and devices.

3. Choose a solution that grows with a rapidly changing mobility landscape

  • Plan for an increasingly heterogeneous device mix including iOS, Android, Windows, Mac and even wearables.
  • Ensure flexibility to support the apps you use today and tomorrow.
  • Empower your developers with a platform that enables rapid and secure app development.
  • Retain flexibility to deploy in the cloud, on-premise or in a hybrid model.
  • Look for a future-proof platform that won’t limit your choices down the road.

4. Ensure your solution is robust and reliable across the lifecycle

  • Ensure end-to-end visibility to detect issues before users are impacted.
  • Avoid introducing brittle components (e.g. VPN, VDI, etc.) into the data path wherever possible.
  • Manage help desk costs by providing your staff with the tools they need.
  • Choose a solution built for scalability that can dynamically grow as your user base grows without interruption.
  • Design mobility as a core element of your business process and ensure that this critical system is always there when your users need it.

5. Plan for the future needs of all your users, including non-employees

  • Determine what sets of users require a Company Owned Personally Enabled (COPE) device and which should be supported via Bring Your Own Devices (BYOD).
  • Define appropriate security policies and app sets for user type.
  • Consider the unique needs of other use cases such as kiosks or shared devices.
  • Look beyond your own employee base to how you’ll securely serve business partners, contractors and customers.
  • Consider the needs of your entire business, workforce and external stakeholders up front to avoid costly redesign or ancillary products down the line.

Ready to get started?

Good, the gold standard for mobile security, is available in the cloud. With no servers or infrastructure to deploy you can be up and running in minutes.

Contact AVR to learn more or sign up today.