It has never been about the device!
To be current, MDM’s, Mobile Device Management systems have evolved beyond Mail, Calendar and Contacts into Enterprise Mobility Management (EMM) Suites by including Content, Access and Application Management with Device Management at the cornerstone.
However, one simple fact remains, it has never been about the device. It has always been about the data. What data can be accessed? by whom? How can it be done to ensure integrity and security.
This becomes absolutely obvious in events that occur every day: a device is accidentally dropped in the dishwater, is fumbles out of your fingers and breaks on the concrete, or is run over by a car. At that point, do we really care about managing the “device”? No, from an individual perspective we really only care about the inconvenience but mostly that we may have lost contacts, pictures and other data that can’t be restored to a replacement device.
The Enterprise concern about a “broken” device is replacement and lost productivity. A security issue does not exist. An enterprises main concern is about the device that’s lost, stolen or compromised so things like this can’t happen.
We all have moments where we temporarily misplace a device or it falls between the bed and night stand. That’s why there are apps to to have the device ring out, come find me. But, at the point that we frantically discover our device is truly missing, lost or stolen the action we take is is to immediately request that the device be remotely disabled, data wiped and service canceled. The answer proves once again that it’s not the the device itself that’s important but the data it contains and can access.
From an MDM/EMM perspective, for all intents and purposes the device you carry is simply a black box. An MDM/EMM is really a means to protect data or securely rendering content on the device by manipulating device features through security policies that control access to the data, should the device get into the wrong hands. Now that was a long sentence, with a lot of meaning, so let me break it down:
- We’ve already established that what’s on the device that can’t be restored is more important than the physical device itself.
- What is of real concern is what data can be accessed or transferred by the device, in the right or wrong hands.
Whats needed is :
- An understanding of how to manage, secure and protect a device and it’s data.
- To understand the business, it’s data, concepts and assets that need protection.
- To adopt a business strategy determine the processes and data to extend to mobile employees.
- A mobile strategy to utilize the most appropriate software, tools, methods and devices to securely implement the business strategy.
- Understand the various employee roles and associated access needs to business processes, applications, data, and the protection needs for corporate and employee owned devices.
Discussing MDM is not really much different than when friends and family who know I work at IBM ask me, “What computer should I buy?” or “What’s the best smartphone to get?” My first question to them is, “What to you want to do with it?” For my wife and a couple of cousins, a mobile device is only used to make phone calls. No texting, no apps, nothing. For them, why get a smartphone and data plan? Another cousin wants a device to support her medical research. In that case, how about a reasonably powerful laptop with sufficient storage?
Again, It’s not about the device—the phone, smartphone, tablet or 2 in 1 computer. It’s about you—what you need to do as an individual or business, what data and applications you will be working with, what and how much needs to be protected, who needs access, where and when. These things will be the foundation of a strategy, which will determine the applications and supporting software infrastructure needed, which will determine which devices best render that data to your employees and customers, which will lead you to the MDM solution that allows you to seamlessly provide protected data to those who need it, where they need it, when they need it.
The bottom line with MDM: it’s never been about the device. Just as Cosmo (Ben Kingsley) told Marty (Robert Redford) in the 1992 movie “Sneakers” , “It’s not about who’s got the most bullets [the tools]. It’s about who controls the information. What we see and hear, how we work, what we think … it’s all about the information!”
Its the same with MDM, the enterprise needs to control or manage “the information”, the data, it’s content and access. I helped establish these services while at IBM using IBM and Vendor MDM/EMM tools.
It was “Cosmo’s” dream come true, “It’s about who controls the information”, and with MDM/EMM’s, YOU manage, protect and control the enterprises information.
To learn more, ‘Gartner’ typically a publishes an MDM (now EMM) report annually called the “Magic Quadrant” containing details about product and service providers. A free copy of the current (2016 )report can be viewed at this link or from EMM Vendor websites.
I hope this was helpful, Please leave comments below or contact me on Linkedin or any means appropriate for you.