Connect with us

Hi, what are you looking for?

HEADLINES

Dimension Data offers tips to secure enterprise mobility

Dimension Data provides enterprises with EM solutions. The company has insights into the challenges, best practices and technologies in the EM space with its Enterprise Mobility Development Model (EMDM), which helps organizations prioritize their investments in wireless and mobility projects.

The capability to adapt to change swiftly and smoothly is one of the best ways to ensure business viability. The last five years has seen data and device use going wireless and mobile, with more businesses making the most of their manpower and the devices these personnel use. Smaller, lighter devices are replacing larger machines and enabling people to do business whether they are in the office, at home or stuck in traffic.

dimension dataHowever, while the arena of EM where organizations utilize mobile devices offers great benefits, it also has its risky areas. Dimension Data’s experience in deploying wireless infrastructure and enterprise mobility solutions across multiple industries and geographies provides benefits for organizations that seek this kind of expertise from the systems integration specialist.

Dimension Data provides enterprises with EM solutions. The company has insights into the challenges, best practices and technologies in the EM space with its Enterprise Mobility Development Model (EMDM), which helps organizations prioritize their investments in wireless and mobility projects.

EMDM is a collaborative workshop tool that enables users to cycle through critical reflection points for addressing and progressing through its EM capabilities and strategies. It maps the current stage of an organization’s standing in terms of the various disciplines of enterprise mobility, their desired future state and a development path to achieve their goals.

Speaking at the Ayala Group of Companies’ recently-concluded ICT Summit 2013, Dimension Data general manager for security solutions and enterprise mobility Guido Crucq weighed in on the pros and cons of EM, BYOD and wireless connectivity.

Advertisement. Scroll to continue reading.

With EM, organizations can respond faster to customer needs, reduce costs and increase productivity by saving time on paperwork and processes by empowering their personnel to complete these tasks while on the go.

Crucq said that while BYOD is gaining popularity, many enterprises are cautious in their approach to wireless connectivity and EM “because of security concerns, and the need to be flexible in using multiple platforms simultaneously, among other things.”

He cited a recent Ovum Global BYOD survey across 20 industries. The global average given by this IT think-tank is this: 57.1 percent of businesses allow and support BYOD in the workplace. The highest numbers, at close to 70 percent in this survey, come from the IT & Telecoms and Financial Services businesses, followed by Media/Publishing at over 65 percent.

Crucq also cited a study by Gallup Consulting that showed that “companies with engaged employees see 18 percent higher productivity and 51 percent lower turnover.” According to him, organizations “see a 20-percent to 25-percent boost in productivity with the use of social media.”

Cost-efficient, productivity-enhancing and choice-empowering system are all good, but Crucq cautioned that organizations seeking to leverage EM must also focus on securing their networks and supporting several operating system platforms and versions across several device types.

Advertisement. Scroll to continue reading.

In this increasingly net-connected world, any organization adopting EM must be vigilant about external threats: Distributed denial of service (DDOS) attacks and mass attempts at identity theft that target not just the organization’s IT systems, but their end-users and customers, too.

Crucq also shared EM best practices: First, “establish a strategic roadmap” to enable the organization to “better understand the EM environment and develop their strategy. Next, he recommended using the roadmap to “align all stakeholders in an organization on their ‘as-is’ and required ‘to-be’ range of EM competencies.” He said organizations embarking on the EM path should “produce a prioritized list of projects and visual roadmap to close the gap” between where an organization stands and where it wants to be.

Operating systems and malware: Android (over 600 versions and 79 percent of total malware attacks); Windows 8 (five versions and 0.3 percent of malware attacks); BlackBerry (four versions and 0.1 percent of malware attacks) and; MacOS (three versions and 0.7 percent of malware attacks).

To keep an EM network secure, the CIO and tech support team of an organization must ensure that secure device management covers device configuration, device inventory, posture assessment, user access, secure connectivity, the ability to do a remote wipe on a misplaced or stolen device when needed, data protection and encryption and the white-listing and black-listing of specific applications.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In this post, we will walk you through the factors that determine the value of your jewelry.

Biz Solutions

If you want to make the most of your next convention, you need to be strategic and plan ahead. Keep reading to learn more.

Biz Solutions

With the right design, these shell scheme graphics help you make a lasting impression on potential clients. But why are they really important at...

BUSINESS

Read our article to learn about new ways that can help you land new B2B clients.

BUSINESS

All in all, IT is an all-around solution for businesses of all sizes. Small businesses, especially, cannot belittle IT's impact on their performance, and...

BUSINESS

Now that you are aware of why logos are important, it is time for you to understand what makes a logo stand out. Continue...

BUSINESS

Here’s what you need to do to manage your remote team successfully.

Biz Solutions

Many individuals ask themselves, “should I Investment into gold IRA” to diversify their portfolios. Take the following considerations when choosing a gold IRA company.

Advertisement