Mobile policy and enforcement for consumerization

Email Alerts

Register now to receive SearchConsumerization.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What's the best focus for MDM strategy now?

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for mobile... 

  • Assess mobile devices before developing a management strategy

    Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, applications and data. Mobile device management must account for who owns what and how it will be monitored and... 

  • Adopting enterprise mobility management

    The number and types of devices touching the enterprise continue to proliferate, so a mobility assessment is the first step in preparing a comprehensive plan for mobile device management. 

  • Regain control with a secure file-sharing system

    As users store increasing amounts of data to the cloud, enterprise IT must develop strong policies and procedures for guaranteeing access and security. Administrators can consider cloud-based, on-premises and hybrid file-sharing systems. Admins shoul... 

  • Consumerization security and compliance

    Rather than try to secure the plethora of consumer devices accessing their systems, enterprises may have better luck focusing on data and application management. Approaches may include the use of encryption, virtual desktop infrastructure and contain... 

  • Setting cloud service usage policies for employees

    Cloud services are still a lawless frontier for many organizations. As with the consumerization of IT, companies need to first determine what is best for their purposes and then inform users of their data security policies. We also take a look at too... 

  • Corporate data in the consumer cloud

    Consumerization trends are having a massive effect on enterprise IT. As end users turn to easy-to use, cloud-based services such as Dropbox and Gmail, which are out of IT's control, they are putting pressure on corporate IT to provide more flexible a... 

  • Data loss prevention strategies in the cloud era

    Privacy regulations and concerns about leaks of sensitive information have raised the priority of data loss prevention as enterprises adopt cloud and mobile computing. Not only must IT craft business rules and tag critical data, but it must also invo... 

  • State of the art endpoint management

    Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s n... 

  • Integrating and managing MDM products

    Even after an organization chooses a mobile device management product, an admin’s work isn’t done. MDM software must monitor diverse devices and enforce corporate policies while integrating with existing hardware, software and IT management workflows... 

  • See more Premium Content on Mobile policy and enforcement for consumerization
  • identity management (ID management)

    Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user r... 

  • bring your own apps (BYOA)

    Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace. BYOA, like the BYOD trend towards user-owned devices in the workplace, is an example of the increasing consumerization of IT.... 

  • consumer device

    Consumer device is an industry term for Internet-capable mobile computers that are marketed to individuals, not businesses. 

  • corporate VM (corporate virtual machine)

    A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use. 

  • endpoint security management

    Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. 

  • enterprise mobility

    Enterprise mobility is a term that describes a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks. 

  • corporate mobility policy

    A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network. 

  • Cisco Integrated Service Routers Generation 2 (ISR G2)

    ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc. 

  • Mobile Active Defense (MAD)

    Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS). 

  • Cisco Identity Services Engine (ISE)

    Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches. 

  • See more Definitions on Mobile policy and enforcement for consumerization
About Mobile policy and enforcement for consumerization

To help protect corporate data on users’ mobile devices, many organizations create a mobile policy. But mobile policy creation is no easy task. IT administrators and CIOs must decide which devices they will support, how employees should use them and what recourse the organization has when a device is lost or stolen. A strong mobile policy not only defines what devices and applications the organization supports, but it often explains which technologies IT can use to secure mobile data (i.e., remote-wipe capabilities). Defining a clear mobile policy is critical, but it can be challenging for employers to word documentation in a way that covers all the necessary measures -- and all potential use cases for mobile devices. Organizations also need to establish policy enforcement guidelines in the era of consumerization. It doesn’t matter how strong your mobile policy is, because if there is no policy enforcement, users won’t follow the policy.