Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Key enterprise mobile management software and technologies

Before companies make the leap into bring your own device (BYOD) initiatives, they need to first be aware of the technologies available to help with mobile strategy. In a recent SearchCompliance webcast titled Policies for Effective BYOD Management and Endpoint Security, enterprise mobility consultant Bryan Barringer discussed technologies and best practices that can help companies make the most of their mobility strategies.

There are a number of enterprise mobile management software tools available, but Barringer said that mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM) are the most important.

Often, MAM tools are packaged with MDM systems, but that doesn't mean those MAM capabilities can "cover everything that you're going to need [an] application management solution for," Barringer said. "You might have partnerships that you make with other companies where they have their own MDM solution already in place and you cannot put your MDM profiles onto that device. You want to be able to roll out your applications to that device and have them controlled at the application level."

A layered approach is important when choosing enterprise mobile management software, Barringer said: Companies should use MAM capabilities that are integrated into their MDM system as well as a standalone MAM application.

Enterprises should also use containerization to help manage data security between applications. "The applications themselves are containerized and federated with each other, so they're controlled, and as that content gets passed from one application to another, it's only being passed inside of those federated and containerized applications," Barringer said. This allows content to remain protected while still providing employees with the tools they need.

App wrapping is another useful technology to enforce your enterprise mobility policies. Many applications that enterprises use are developed by a third party rather than internally and therefore don't allow IT shops to embed security controls. App wrapping allows for an application management administrator to add a shell that contains your security profiles to a third-party application without changing the underlying app.

Enterprises should also utilize "micro VPNs" to manage network access from mobile devices, Barringer said. Micro VPNs enable admins to mandate that a specific application or set of applications must use a specific VPN client, as opposed to allowing an entire device with non-controlled applications access to the network.

Limiting network access can also be done with identity services. Using an identity services engine enables enterprises to allow "only certain devices to connect to your wireless LAN or Wi-Fi," Barringer said.

These are only a small sample of the technologies and best practices that are essential to an enterprise's mobile and BYOD initiative, so Barringer suggested always doing research before making a decision. "You need to do your due diligence on both governance as well as which technologies are going to be best for you," he said.

Visit SearchCompliance to catch up on part one of this webcast series, where Barringer discusses the mobility and BYOD legal issues today's enterprises must be aware of, and check out part two to learn more about effective BYOD policies for enterprise mobility.

Let us know what you think about the story; email Ben Cole, site editor. For IT compliance news and updates throughout the week, follow us on Twitter @ITCompliance.

View All Videos