Mitigating the risks of BYOD with mobile application management

10.09.2012

Again, this takes us back to the first consideration -- how involved a company wants to be in managing user-owned devices. If user-owned devices are fully managed by an enterprise, the apps and resources can be made secure, but all the issues associated with the complete management of user-owned devices are brought to the surface.

TECH DEBATE:

With these considerations in mind, it should be noted that the most common tool used to implement secure BYOD up to this point has been , or MDM, technology. MDM certainly has its place in enterprise mobility. In fact, it is an essential part of a complete enterprise mobility strategy.

MDM is technically a viable method to both deliver to user-owned devices and secure the corporate apps and data on them. For example, many MDM solutions feature functionality. They also provide the ability to push applications to managed devices. In addition, MDM solutions allow enterprises to enforce security controls on properly prepared corporate-connected user-owned devices. Thus, MDM does address considerations two and three above.

However, using MDM to address these BYOD considerations means enterprises are forced to fully manage user-owned devices because, simply put, that is what the technology does. Thus, all of the concerns and issues associated with complete enterprise management of user-owned devices are fully set in motion.