Both “mobile device management” and “data security” contain many meanings of MDM/ EMM solutions. Let’s even say – too many. Meanwhile the functions of such platforms are very specific and pursue very important challenges that are really useful in many organizations from different industries. Let’s imagine for example…
The idea of writing this article arose from a previous article on LI “Jak “przeskanowałem” Polskę” (“How I scanned Poland”). And to be more precise from questions that appeared in my private inbox on LinkedIn. People were interested on how to secure their servers and asked to check if their servers are safe. You can […]
Do you remember phrases like OMA DM, SyncML or OMA CP? No? Take it easy! It’s been a long time since the foundation of the first Mobile Device Management systems (or some similar systems) appeared on the market. Since then a lot has changed, a lot of new protocols and many more systems have been made. Now, most of you have probably heard about shortcuts like MDM, EMM and the hottest and latest one – UEM. Mobile devices are part of our life and it is really hard to imagine working without these tools even if you are an employee of a nuclear power plant! Let me tell you a story…
Android Q brings new features for enterprise, but in the same time deprecates one that stuck for the last 9 years… Device Admin! Device Admin was available since Android 2.2, so quite a looong time. No wonder that now, when Android 10 is about to come, Device Admin is outdated and has already been for a long time. It was considered a legacy management approach even back in 2014, when Android 5 with fully managed device and work profile was released. Since Device Admin introduction in 2010, Android came a long way – surprising, huh? :). As a result, Device Admin is not well suited to support today’s enterprise requirements.
Let’s start with a small confession: I used to be a real ignorant when it comes to everything related to data security, passwords, permissions, sharing information on the internet, etc. Probably, still all these issues I could pursue with even greater care but it looks really reasonable now when I look back and compare my current state of knowledge and awareness of threats with that lack of interests and all those bad habits from the previous years. I don’t want to justify myself (or maybe a little), rather it’s one of those thousands situations that confirms an old truth that the example comes from the top.
Recently I am really focused on my habits. I try to weed out bad ones, and at the same time introduce and nurture good ones. I learned the theory reading first Charles Duhigg’s – The power of habit and later James Clear’s – Atomic Habits (by the way, I recommend both books to everyone!), and right now I am putting their tips and rules to practice – all the way from taking daily walks early in the morning, to spending less time with smartphone and tablet when with my family.
Many organisations understand the need to protect and secure their data, even on employees’ private devices (if Bring Your Own Device policies are implemented) – the main threats which trouble the IT and security managers are potential loss or theft of data and lack of user awareness (based on a report we’ve done together with Computerworld in 2018 ).
Uneducated employees are dangerous for the company. They could be on some kind of spree, that solving problems could be exhausting. This is true for any industry: clicking on an attachment or inserting an infected USB flash drive brought from home means the end, a cryptoware infects the company’s network, the work is paralyzed, the IT department is looking for up-to-date backups to restore drives encrypted by the virus and CEO calculates losses from downtime.
These solutions can be treated as the next generation of anti-virus software for mobile devices. MTD is a set of tools which allow protection of the mobile device and applications against “advanced” threats. What are these advance threats? To put it simply – anything other than simple data theft once the device is lost or stolen, installing an unwanted application or eavesdropping the network traffic to and from the device.