April 20, 2015 By Rob Patey 3 min read

“I can’t find my phone. It’s either inside a Hogwarts backpack at my son’s school, Penn Station in New York or traveling at 30,000 feet and accruing a ton of frequent flier miles.”

How does a support call like this still account for 32 percent of mobile security incidents in 2015? Aren’t we in the age of apps? Isn’t the wearable employees’ next frontier in working from wherever, whenever and off whatever limb they please? Hasn’t the bring-your-own-device triage been brought up in every tech conversation since chief executive officers first swiped a tablet? Wasn’t mobile device management (MDM) decreed dead and buried for the more data-encompassing and deep dive-enabling powers of enterprise mobility management (EMM)?

Yes, all of that happened. However, human evolution and technological revolution don’t walk in tandem. This fact of tech outpacing our ability to master it isn’t a new concept, but when it was recently and so starkly displayed before me in “The State of Mobile Security Maturity,” a report by Information Security Media Group, I realized perhaps all of us bits and bytes pundits needed to breathe for a second and reflect on the basics of unprotected devices.

With oops-a-daisies still beleaguering support queues, cloud MDM for device-level security actually demands another glance. With the right solution choice, your MDM is not just a security standard for now — it’s a platform for mobile productivity choices later.

Enterprise Mobility Management and Mobile Device Management: Different, Yet the Same

Sixty-four percent of companies are using some combination of EMM and MDM technology to mitigate data loss when the inevitable leave-behind occurs. However, that still leaves a wide-open field of app security or content-only security for many large organizations. Sure, you might keep corporate emails safe if they’re inside the chief financial officer’s email container, but every bit of personal information is now sitting in the finder’s hands. When 98 percent of your workforce can leave the company between the seat cushions on a train, why leave any part of their device and ultimately themselves exposed to exploitation, bother or even a trifle such as personal embarrassment?

I liken EMM to the current thoughts on universal expansion. MDM was the Big Bang explosion of mobile security that gave idea and then form to EMM essentials such as separate passcodes for email, intranet gateways, secure Web browsing and file share management. IT must remember that users like to save things, and rarely where recommended by IT. Information can leave your more archaic email containers faster than you can say “cut and paste.”

With mobile device management as your foundation, the passcode security policies are in the same pane of mobile management glass as your corporate app store. Your EMM then burgeons into separating email, Web browsing, content and all work into a consolidated IT permissions center and privacy safety center for employees. When 19 percent of companies still sidestep device-level control because of “my device privacy paradigm” shifts, I shake my head and dust off a little piece we came up with years ago called “Bring Your Own Device: Ten Commandments.” I have seen many companies distribute this cartoon tale to assuage fears of IT being a voyeur as opposed to merely a watcher with an eye on the whole flock, focusing on the individual lamb only when it gets lost.

At the end of the day, MDM is EMM, just as EMM is MDM (simply with a better public relations agent right now). When you hear soothsayers decrying down the lane to “bring out your dead solutions,” remember that while your first MDM might be on its last legs, not all MDMs rested on their initial option sets. If you skipped MDM or are first entering the mobile security conversation, make sure you know exactly what device control means and how much EMM can be leveraged in the same portal. Device security shouldn’t be shunned, especially when it can offer much more than just device security.

https://youtu.be/u-AOq3k6Nfo

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today