Tag Mobile Device Management

Implementing BYOD

BYOD

Bring-Your-Own-Device (BYOD) is permitting employees to bring personal devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access company information and applications.

Create a Private App Store

Designing a private App Store provides the ability to manage custom and purchased apps.  Businesses can manage apps by pushing mandatory apps, approving recommended apps and blocking rouge or unrelated apps.

Policy Compliance

Policies ensure security, productivity, protection of resources and reduce risks.  Implementing a location-based service (LBS) such as Geo-Fencing and GPS will set limitations on access to data based on location.

Strong Security

There are many layers of security for a BYOD environment.  Device enrollment can be a one-time passcode and/or Active Directory credentials.  Applying user profiles will distribute policies, restrictions and Apps based on logical groups (department/location/device type).  Other types of security are tracking device locations, Remote Lock, Complete Wipe and Corporate Wipe.

Track Usage

Usage thresholds can be monitored based on talk, text, data and roaming for each user.  Setting up alerts and reports for misuse, excessive bandwidth, additional charges and security exposures will help track usage appropriately. 

Banning Rouge Devices

Compromised devices such as “jail broken” iPhone or a rooted Android should be restricted from accessing enterprise data and resources.  Compromised devices are susceptible to virus attacks.

For more information on Mobile Device Management

Contact us at 856-745-9990 or click here.

 

Android Dominates Apple & Microsoft

aam1 Takeaway:  Canalys’ Market Shares for Quarter 1 of 2013 showing that Android is dominating the Worldwide Smart Mobile Market.

After being released in 2007, this Linux-based operating system is the most used platform for smartphones. According to BBC News, Android has 900 million activations.

Android has 59.50% Market Share for the first quarter of 2013, according to Canalys.  Apple has 19.30% Market Share and Microsoft has 18.10%, together does not equal to the Android market.  The  Worldwide Smart Mobile Market includes Netbooks, Smarphones and Tablets

Chart

Windows Phone 8

WP8_2

Takeaway:  Information for and against Windows Phone 8.

The second generation Windows Phone was release in October 2012.  Windows Phone 8 bundles essential functionality including navigation, storage, sharing and apps.

Windows Phone 8 runs Modern UI (Metro) which is typography-style layout also known as Swiss Style.  Microsoft added several new colors as additional options for users such as Cobalt, Olive, Amber, Steel and many others.

The apps collection does not include popular apps such as YouTube, Flash, HBOGO and several others.  Lastly, Windows Phone 8 does not have vocal turn-by-turn navigation.

Unlike iOS and Android, the core of social media, such as Facebook and Twitter, are built-in to the operating system.  Windows Phone 8 does not have a notification bar (Android) or disrupting notifications (iOS).  Checking social media updates, e-mail and weather will be a simple task after setting up your home screen by arranging live tiles.

 

Protection for WiFi

Takeaway:  Five simple ways to protect your information when using WiFi and Hotspots.LOCK2

WiFi is exchanging data through a wireless local area network (WLAN) from electronic devices including smartphones, laptops and tablets.

Also, WiFi is available in public places such as Airports and Restaurants.  Identity Thieves, Hackers and Criminals take advantage of WiFi because it is convenient for users to access personal information.

1.  Avoid accessing your bank accounts & online stores:

When using public WiFi, it is best to avoid using your credit card or banking information.

2.  Double check the WiFi name:

Prior to connecting to a public network double check with an employee for their network name.  Identity thieves can create a false Hot-Spot, have users connect and then steal personal information.

3.  Turn-Off “Auto Connect”:

Stay in control of what networks you connect to, smartphones have a setting that automatically connects you to the closest open network.  Simply, turn this setting off to decide what networks to connect to.

4.  Never use the same Password:

An additional step you can take to keep online accounts safe is to use different passwords for each account.   Using the same password makes stealing your information easier for criminals.

5.  Check the Lock:

The extra layer of security is the locked padlock in the address bar of your browser or “https” which means that your information has been encrypted.

Top 4 Smartphones

Takeaway:  Specifications break down of the top four prominent smartphones.

In the United States the top four smartphones are Samsung Galaxy SIII, iPhone 5, Samsung Galaxy Note II and Motorola Razr Maxx HD.  The chart compares mobile carriers, platform, hardware, networks/ Wi-Fi, display, camera and battery for all four leading phones.

If you’re thinking about buying a new smartphone, the chart below will be a quick guide with the necessary feature-to-feature comparisons to make a worthy choice.

Smartphone_Blog_040813_2


Mobile Device Management (MDM)

SJT Support helps enterprises perform mobile device management to configure and secure their mobile devices from a central place. It simplifies the work of administrators by making them perform both desktop management and mobile device management using a single console.Enterprises have to scrutinize the devices that enter inside the company. It can be a corporate owned or personal device (BYOD).

SJT Support Mobile Device Management (MDM) allows you to perform the following:

  • Enrollment of Devices
  • Profile Management
  • Asset Management
  • Application management

Supported Mobile Devices

Apple iPhone, IPad, IPod Touch running iOS 4 and above.

Enrollment:

  • Over-the-Air (OTA) enrollment of devices
  • Manually enroll mobile devices for management
  • Bulk enrollment of mobile devices using a CSV file
  • Authenticate enrollment with a one-time passcode and/or user’s Active Directory credential.

Profile Management:

  • Configure Policies/Profiles – Configure policy settings to access enterprise resources.
  • Restrict – Restrict the use of camera, youtube, safari browser, etc.
  • Corporate access – Provide access to corporate accounts like Email, Wi-Fi, VPN.
  • Device Group – Create a logical group of devices based on department, location, or to distinguish corporate and BYOD and apply policies, restrictions and distribute Apps to all devices in the group.

Asset Management:

  • Get complete information about the device like device details, certificates, installed Apps, etc.
  • Get complete visibility about the devices with out-of-the-box reports.

Application Management:

  • Manage and distribute both in-house and App Store Apps
  • Integrates with Apple Volume Purchase Program (VPP) for hassle free distribution of commercial Apps.
  • Publish the Apps in App Catalog for users to choose and install the Apps themselves.

Security Management:

  • Passcode: Enforce strict passcode to prevent unauthorized access
  • Remote Lock: To prevent misuse of misplaced/lost devices
  • Complete Wipe: To prevent data loss/theft by erasing all the device data making it as good as new.
  • Corporate Wipe: To remove only the corporate data leaving the personal data like contacts, photos, etc. Useful for BYOD when the employee leaves the company.

Audit and Reports:

  • Audit devices that are inactive or have installed a specific App
  • Check whether the devices are passcode compliant.
  • Out-of-the-box reports on Apps by Devices, Devices by Model, etc.

For more information on Mobile Device Management please contact our support team by email at sales@sjtechies.com or by telephone at (856) 745-9990.

Microsoft Surface: iPad knockoff for enterprise?

As I’ve said many times, I barely have any use for the new iPad. Most technologists I know feel the same way about tablets. However, most of us understand that we’re an anomaly. For tens of millions of people, using a tablet like the iPad is infinitely easier and less frustrating that dealing with a Windows laptop. That’s why tablets are eating the bottom out of the PC market, and the trend is accelerating.

Microsoft knows this. It also knows that an alarming number of companies are allowing their employees to use iPads and some are even running trials to hand out the new iPads to lots of highly mobile employees. What’s even worse for Microsoft is that most of these employees are loving it and are gladly chucking their Windows laptops aside.

 

While a lot of these employees will still periodically use Windows machines for some of their work, they’re using them less frequently and that means slower PC upgrades and less urgency to jump to Microsoft Windows 8. We’re still only talking about a fraction of the market — iPad will sell 60 million units in 2012 versus 400 million PCs, according to Gartner. Nevertheless, it has Microsoft freaked out because it’s been just a little over two years since the iPad debuted.

That’s a lot of disruption in a short period of time.

Of course, that brings us to the announcement of the Microsoft Surface tablet this week. Microsoft turned a lot of heads by revealing that it is going to build its own line of Microsoft Windows 8 tablet devices, à la Zune and Xbox. The hardware design for the Surface that Microsoft showed off on Monday was impressive enough to pique the interest of the tech press and the public.

The tablet itself looks a lot like the new iPad and many of the high-end Android tablets, but there were a pair of features that stood out. The first was a sturdy built-in kickstand that stealthily pops out from the back of the tablet. The second is the magnetic cover that doubles as a keyboard and touchpad. When you put these two features together you suddenly have a tablet that easily doubles as a laptop. That eliminates the need for someone to have two devices.

Sure, the hardware of the Microsoft Surface Tablet echoes the iPad. But, Microsoft did use a special magnesium body that makes it light, thin, and durable. Sure, the cover of the Surface is a copy of the iPad’s Smart Cover, but Microsoft did innovate by adding a keyboard on the inside.

There’s plenty about the Microsoft Surface Tablet that screams, “iPad knockoff!” and the failure of Android tablets and the tablet debacles at RIM and HP show that trying to build an iPad competitor for the enterprise can be a brutal business.

Still, the Microsoft Surface Tablet has something going for it that the BlackBerry PlayBook, HP TouchPad, and the parade of Android tablets don’t — it’s going to automatically drop into the Windows networks that most Fortune 500 companies as well as a lot of small and medium businesses already have in place. That’s going to mean a lot fewer worries about compatibility, security, and data protection. In other words, it means a lot less work for IT on the backend and a smoother transition for many users

That doesn’t mean the Microsoft Surface Tablet is a slam dunk. There is still a big question about whether users are going to find the Windows 8 interface as easy to use as the new iPad. And, will spyware and malware become a big problem on the Surface since it’s running the full version of Windows? Above all, how much is it going to cost? The Pro version of the Microsoft Surface Tablet that most businesses are going to want is expected to cost about the same price as an Ultrabook — in the $800-$1000 range.

Ultimately, if you want to think of the Microsoft Surface Tablet as an iPad knockoff with a few key innovations and additions that make it a legitimate option for businesses, that’s fine. A lot of companies will be happy to pay a premium for an iPad look-alike that automatically fits into their current networks and is guaranteed to work with their existing applications.

To View Full Article Click Here