Future-proof your EMM with these four main functions

3:46 PM
Future-proof your EMM with these four main functions -

The MDM-Only Dilemma: Why is it a problem

Mobile Device Management (MDM) was developed prior-two more than a decade decades ago, when you return the BlackBerry days.

During this time, MobileIron, AirWatch and a few others on the MDM policy juggernaut tackled, and added scores of mobile device security and control policies, regardless of whether it would be used, or if they were needed. Innovation was slow, limited and dictated by the mobile OS providers (namely Apple and Google), which provided the necessary APIs.

Today each MDM vendor including Citrix uses the same well documented Apple and Google APIs provide security at the device level.

, for example, Citrix supports Apple's original guidelines under the managed app configuration, documenting the configuration and security features, mobility Device Management (MDM) party applications can use to secure, as part to manage the device. And the challenge is MDM-only solutions based (MobileIron, AirWatch, IBM, et al ) control the entire device and everything on it - so, not only things work, but personal things, how well. Company IT has to protect the entire device attack surface against threats, and the employee must hand over their mobile phones and tablet PCs

Imagine a BYO (bring-your-own) device program that sounds wonderful -. Use whatever device you want for your personal use (emails, tasks, photos, Facebook, the usual) and, hey guess what! You can also add your business email, calendar, contacts and mobile applications received. But there is a big catch.

employees must "enroll" their devices with IT, which is a nice way of saying that your IT department can now find the control and wipe everything on your device (including your personal apps, photos, E -mails, social applications and so on, in some cases). Who wants that? It's like a BYO program for your laptop, but you have to "join the IT domain", where you are required to run a few things on your personal laptop. I was there, hate that, I'll pass.

MAM and the approach to 'Protect What Matters "

something new came to MDM, and it was (called MAM). MAM operated at the higher app-layer Mobile Application Management, and suddenly the interests of customers and the success was reborn now allows IT to focus on. "protecting what counts." - that is, to secure business applications and data, and not the entire unit

understanding Do not get me wrong. There are many scenarios for which to add the customer for equipment reliability MDM (eg, task-based workers sharing devices), but we believe that it will be voluntarily must and not a hard requirement. the EMM provider, the ones that can MAM-only offer, MAM MDM hybrid and MDM-only solution flexibility for the right fit for the right user communities within a company.

are winning in the long run here what with MAM cool. IT companies can manage data. For example, activated as cut-and-paste between applications or prevented Business Apps Using device cameras to keep photos inside the container and not in the user's personal "Camera Roll" SSO between applications etc. My personal favorite MAM -only data encryption, which means that device PINs (often known or accurate guess of friends or relatives) are not sufficient to open and use business applications.

Picture1

MCM and data security

But wait, there's more. Data is hard and, unlike applications, it can actually be the device user and can live anywhere. Klug, industry analysts cover the EMM now add Mobile Content Management (MCM) or Enterprise File Sync and Share (EFSS) requirements as a must-have in the EMM solution stack. Companies need to control file access (who, what can access), file storage (they can store in the cloud or just to make their data centers) and file sharing (simple but secure sharing only with the right people).

Citrix is ​​far ahead of the game by Citrix Share File within XenMobile. And not only the packaging but a deep integration for files in emails, seamless access to network shares, SharePoint cloud drives and other data storage attachment and controlling, in which everything is stored - cloud or on premises. With Share File, only Citrix provides a EFSS market leaders in their EMM solution offer available.

True App-layer VPN

So, what is still missing something? MAM innovation and BYO solution fabulousness - check. Flexibility to have MDM as an option, the device registration required - check. MCM integration - check. Ah, such as the end-to-end security through a network gateway. Can a mobility solution without be such that access enterprise resources such as directory services, mail servers, intranet sites, SharePoint, network drives, and so on. you need a network gateway, perform the following actions:

  • scale Confidently tens-of-thousands of simultaneous connections
  • Run on a secure virtual or physical Linux based appliance (no Windows login)
  • Easy configuration high Availability (HA) pairs and array
  • integration with EMM solutions for enhanced security policy controls
  • seamlessly provide SSO capabilities for enhanced user experience
  • And what is most important is working on the app layer for real MAM-only (non-enrollment) solutions

Let me explain the last ball as it is really important. Many EMM vendors today claim "per-app VPN" ability. That's exactly what it means: that you configure which apps can and can not use the device of the VPN. A simple MDM policy.

XenMobile provides a highly differentiated " App Layer VPN ", which we call "micro-VPN". This is not the device does not use VPN. In other words, for a MAM-only solution that business applications and data is the backup that are important, there is no need to configure a VPN on your mobile device! Each app is a micro-VPN tunnel as required (eg email will establish a tunnel to Exchange and another to SharePoint for a file attachment) and when the application is closed, the tunnel will be removed.

Like any security can you per say key to reduce the attack surface. With XenMobile and micro-VPN, IT can also configure specific applications to use different network gateways; for example if you want certain applications special MFA (Multi-Factor Authentication) require access control.

Citrix also is far ahead of the game by integrating and bundling Citrix NetScaler with XenMobile. And this is not just a simple packaging, but a deep integration with out of the box real app Layer VPNs and policy controls. NetScaler can only Citrix provide an ADC market leaders in their EMM solution offer available.

Does anyone Say workspaces?

Citrix practice, the terms "mobile invented Computer" and "mobile work styles" a few years ago. I know, I was there. It is interesting, others finally accepting to see these conditions, follow a big thank you for our reasoning. It is what is best for customers who are looking for complete solutions that ensure every app on any device with full end provide the security of information in all environments finish

XenApp, XenDesktop, XenServer, XenMobile, Share File, NetScaler. - The industry's most comprehensive "work" solution on the market - is in a composite bundle and price within the Citrix Workspace Suite for on-premise installations and Citrix Workspace cloud as an integrated suite available

We can all , agree, I think that it is best to know where the market is headed, rather than where it's been.

How do you rate options to support your mobile initiatives and modernize your business, I encourage you to score and measure the various manufacturers on the basis of completeness of their offers, their product strategy and future direction and how well the product direction is consistent with the vision for your business and technology strategy.

Synergy Banner

Previous
Next Post »
0 Komentar