One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1933974
Date de publication 2020-09-23 05:01:00 (vue: 2020-09-23 06:13:20)
Titre What is mobile device management? MDM explained
Texte This blog was written by a third party author. Not too long ago, the desktop computer was the primary computing device for enterprise employees. With the rise of mobile endpoints like smartphones, laptops and tablets, employees are connecting to corporate networks from a wide variety of places and devices. Today, especially with the popularity of the WFH (work from home) model, managing the multitude of mobile devices is more complicated than ever before. The statistics tell a sobering tale. For example, 70% of breaches originate on the endpoint, making it the number one target for attacks. Even more concerning, according to a recent study, 60% of breaches were linked to a vulnerability where a patch was available, but not applied. The moral of the story: mobile device management is critical for any corporate network. What is mobile device management? Mobile device management (MDM) is a software tool for IT departments and administrators that allows management of all mobile endpoints, including smartphones, laptops, tablets, and IoT devices. Endpoints can be owned by either the company or the employee, and the MDM solution can be hosted onsite or in the cloud. The goal of an MDM is to find the right balance between management, productivity and policy compliance. As personal devices proliferate onto enterprise networks, MDM plays a vital role in securing corporate networks while allowing employees to continue to work more efficiently. Mobile Device Management software relies on the client/server model to function. Using a management console, the server component allows IT administrators to configure and assign policies. The client component resides on each mobile device and receives whatever directives have been assigned from the management console. MDM is now a mature platform that has seen significant advances. Client-initiated updates are a thing of the past, as modern MDM software can instantly discover any new endpoint making a connection to the network. Today’s MDM is much more streamlined. Managing BYOD with MDM The line between a mobile user and an on-premise employee has blurred as almost everyone brings some type of personal device into the workplace. The BYOD (bring your own device) movement in many organizations is no longer a movement but more of a norm. The need to monitor and manage these endpoints has never been greater. While the benefits of BYOD are clear — lower equipment costs and more time available for IT personnel come to mind — if endpoints are not actively managed and monitored, the security risks are significant. Mobile device management is a critical component of any BYOD policy, as it allows the business to maintain control of their company data and how it is accessed.   Tablets and smartphones can be difficult enough to manage in the BYOD era. After all, they’re arguably less secure than laptops and desktops due to a lack of pre-installed malware protection. But when IoT is added to the mix, especially if employees aren’t aware of the security threat it poses, the importance of the MDM multiplies. According to a recent Infoblox report, a staggering 80% of IT professionals surveyed discovered shadow (unreported to the IT department) IoT devices connected to their network, and 29% of them discovered more than 20. These devices could be smart TVs, kitchen devices, cameras, or personal health monitors. We’ve discussed IoT security before; by default, devices are inherently in
Envoyé Oui
Condensat “you  mobile access accessed according active actively ad/ldap added adding adds administrators advances after against ago air all allow allowing allows almost any apple apple’s application applications applied approximately apps are aren’t arguably arise assign assigned attacks author automated automatically autopilot available average aware balance basic because been before before; benefits best better between blog blurred both box breached breaches bring brings builds business but byod bypassed cached cameras can can’t capabilities catastrophic chances choose choosing clear click client client/server cloud come comes company compared compliance complicated component computer computing concerning configure connected connecting connection connectivity console content continue continuously control corporate correctly costs could course critical data decide decisions deeper default defense demands department departments deploy desktop desktops detected device devices difficult diligence diminish direct directives directly directory directory/lightweight discover discovered discussed diverse documents drastically drive due during each efficiently either emm employee employees enable encrypted endpoint endpoints engineering enough enrollment enrolment ensure enterprise entire environment equipment era especially evaluating even ever everyone evolved example existing explained extremely features find fleet from function functionalities further get glass goal goals goes going good google google’s greater groups happens has have health home hosted how however identity impact implemented importance important imported including infoblox infrastructure inherently initiated initiatives insecure installed instantly integrate integrates integration involvement iot it’s key kitchen knows knox lack laptops layers less like line linked links long longer look lookout lower maintain maintained making malicious malware manage managed management manager manages managing many mature may mdm mdms meet microsoft microsoft’s might mind mix mobile mobility model modern monitor monitored monitors moral more movement mtd much multiplies multitude must name necessary need needed needs network networks never new norm not now number occurs often one only onsite onto organization organization’s organizations originate over overlooked oversee own owned pane party past patch personal personnel phishing place places platform plays plus policies policy popularity poses practices pre prefers premise primary productive productivity professionals programs proliferate protecting protection protocol provide received receives recent records reduce registration relies remediated remediation report repositories require resides reviewed revoked right rise risks role rules sabotage safely samsung’s saved saves saying secure securing security see seen separated server services set shadow sharepoint sharing should significant single six smart smartphone smartphones sobering social software solution solutions some specific specifically staggering statistics status step story: streamlined study success such supercharged supports surprise surveyed synchronicity tablets take takes tale tapped target teams tell termination than them these they’re thing things think third threat threats three through thus time today today’s too tool touch transformation tvs type types uem uem’s under unified unique unlike unreported updates upon url use user users using variety vectors version versus visibility vital vulnerability way we’ve wfh what whatever when where a whether which wide will windows wiped work workplace written year you: your zero
Tags Malware Tool Vulnerability Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: