10 Key Pitfalls to Avoid While Implementing MDM

by March 5, 2015 0 comments

The use of mobile devices for work is ubiquitous and rather than thinking of retarding its growth, think of ways to manage it effectively. Here’s a list of key pitfalls you should stay clear off while deploying an MDM plan

1.    Ensure your MDM tool is compatible with common mobile platforms and updates itself with the update of a mobile platform. This would not only ensure better compliance with your enterprise mobile apps but also save you from the scare of a security lapse.
2.    It should be able to function through handsets being serviced by different service providers and also over WiFi.
3.    You should be able to add or remove devices from your network like you shuffle your pack of cards. This would ensure optimum network efficiency and security.
4.    Dont be over-intrusive or impose impractical controls. This is the trickiest part as there is a very thin line that separates security and management from prying into someone else’s personal life. Most of the MDM strategy gets discussed at the top level but ultimately has to be implemented by the local IT manager. Be very clear about the software that’s going to be installed on the employee’s device and what’s really necessary for the organisation. Here again check if the device has been provided by the organisation or if it is his personal device. In case it is a personal device then publicise the list of dos and donts to all employees and ensure there is no discrepancy in their interpretation and there’s no fine print to be misused. Ensure there’s no case of ugly scuffles in your office with an overzealous IT manager trying to impose a dozen management/security solutions on the mobile device of an unsuspecting employee. For one, the quality of software being deployed itself could be questionable and secondly, the solution itself might harm the working of the device.
5.    You would have got the hint from my previous point but do ensure whatever solution is decided upon to be deployed, is free from bugs and malware and should not cause any drop in efficiency of the device. In case the software are resource hungry, do let it be known to all in advance.
6.    Don’t track unnecessary employee activity. Just because an employee’s mobile is GPS enabled does not mean that his location is under constant surveillance. Likewise if he is on Facebook or watching videos during office hours, you can deal with him with more sober ways than recording his chain of chat messages and clippings of videos he’s watched during that period.
7.    Strive for consistency in productivity apps. While you deal with multiple devices and platforms, focus on the output/productivity from an employee. Even if it means investing some money on getting an app that works seamlessly across all platforms. This would not only ensure consistency of output across all employees but also help in easier management across different platforms.
8.    Keep an eye on the devices at work. An IT manager can never relax even if the management of IT resources has shifted from the workstation to apps on mobile devices. Keep a look out for the various devices that are connecting to your network, what apps they are accessing, what impact it has on your bandwidth, etc.
9.    Don’t give employees a free hand over network resources. While bringing personal devices is an evolution of the IT era and can’t be stopped, keeping a check on what employees download through the enterprise network and whether they are exploiting it for personal gains is of paramount importance. Remember you still have to protect your network from malware and data leakage. So make it clear to the employee as to what behavior is acceptable in office.
10. Prevent access to jailbroken and rooted devices as these can compromise information security and company data in no ordinary way.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.