Blog

Endpoint Management on a Retail Network

Posted by:

The other day, when I was swiping my credit card at one of the smaller stores of a huge retailer, a thought crossed my mind… Here’s your typical endpoint in the retail industry. A point-of-sale (POS) device at the store. Running on the Linux operating system. Can be powered off during non-business hours.  Is my credit card data secure on it? Is this endpoint compliant with PCI-DSS? Is the software on the POS up-to-date and patched? Looking around, I saw ...

Continue Reading →
0


Network Management Implications in Today’s Mobile Wifi World: Managing from the End User’s Perspective

Posted by:

Just over twenty years ago I went along to HP’s offices in London to see their new network management offering – Openview – and evaluate whether we should buy it at the company I was working with at the time. I recall that on their demo machine it was hard to pick out the network devices, the routers and servers, because every IP-enabled device on the network had been discovered and was displayed. It was not the norm at that ...

Continue Reading →
0


30 days in mobile isolation – my experiences

Posted by:

Much has been discussed and written about the need to separate enterprise and personal data on mobile devices. In fact, if you haven’t noticed, technologies in this space are popping up like May flowers after April showers. These solutions entail a variety of approaches, limitations and levels of flexibility and maturity. All that said, when I was offered the ability to trial an example of this technology, I wanted to take the challenge to see what it delivered, didn’t deliver ...

Continue Reading →
0


Managing Mobile Applications

Posted by:

As organizations move beyond the core device management needs of enabling access to PIM functions, there has been increased focus on approaches to managing mobile apps, particularly 3rd-party apps.

 

There are three main approaches to managing mobile apps:

 

- Leverage native OS capabilities for app management

 

- App developers (internal and 3rd-party) incorporate management vendor SDKs/libraries to enable integrated app management

 

- Leverage an app wrapping technology to “wrap” an app binary with a layer ...

Continue Reading →
0


Comparison of Native Mobile Device Management & Container Approaches

Posted by:

There are two main approaches to mobile device management:

 

- Native Management: Native management vendors support the enterprise management capabilities that OS vendors (such as Apple, Google, and Microsoft) continue to refine with each update to their respective OS’. These native capabilities include password policy enforcement, device encryption, enterprise email access/configuration, among others.

 

- Container: This approach leverages an enterprise container app that replicates and replaces native OS capabilities such as mail, calendar, contacts, and browser to more tightly control access to ...

Continue Reading →
0


Enabling Authenticated Enrollment with IBM Endpoint Manager for Mobile Devices

Posted by:

The update of IBM Endpoint Manager for Mobile Devices last month included the new Authenticated Enrollment feature.   In the article below,  I’ll detail how you can easily enable this and configure user enrollment questions too.

MDM Architecture

Before you do, it’s a good idea to recap the overall MDM architecture once more.  You’ll already have your Endpoint Manager server running on your internal network and the Management Extender for iOS on a server in your DMZ (servers shown below in grey). ...

Continue Reading →
0


Enabling the Self Service Portal with IBM Endpoint Manager for Mobile Devices

Posted by:

Following my post last month on Enabling Authenticated Enrollment,   I’ve also detailed below the process for enabling the Self Service Portal (SSP).   The IBM Mobile Devices Self Service Portal is a web-based method that allows you to manage your personal device without logging onto the TEM console.

Enabling the Self Service Portal

The SSP fits in with the overall IEM for MDM architecture as detailed here.    In most cases, the SSP will be located on your intranet for ...

Continue Reading →
0


Minimise your Data Roaming Bill Shock with IEM for Mobile Devices

Posted by:

When talking to clients about mobile device management,  almost everyone highlights examples within their organisation of bill shock from data roaming charges.   It’s discussed further on the following ABC Australia video.    Whilst people are being educated on cost implications and there are calculators like this one fromTelstra,  many people are still getting caught out with huge bills.   It also appears to be a particularly bigger issue in Asia Pacific for some reason.

Continue Reading →
0


Mobile A Hot Topic At IBM Connect

Posted by:

While “I am an IBMer”, I’m not all that familiar with our Collaboration Solutions product group beyond the fact that it includes the Lotus Notes system, which can be accessed from my iPad with the Lotus Traveler app. So I was curious about heading to Orlando this week to present to this group of customers at the IBM Connect conference on mobile management and security. The conference of course had discussions about extending Lotus Notes to mobile devices, but also ...

Continue Reading →
0


Thinking out loud: It takes a village to raise a secure mobile ecosystem

Posted by:

Recently I had the pleasure of participating in a mobile security panel discussion at Sprint’s Developer Conference with panelists that represented a handset maker and two other security technology providers. Surprisingly, there was little disagreement across all of us for most subjects, though somewhat differing perspectives. Toward the end of that discussion, one of the questions that was posed was interesting – “who did we think was responsible for educating users about mobile security?” The question came out of previous ...

Continue Reading →
0


Page 1 of 3 123