Unified Communications, Network Security
Article | July 10, 2023
Despite a global pandemic and the associated economic challenges, the world has moved to 5G four times faster than it did with 4G LTE, according to 5G Americas.
In the midst of this rollout, how can industries ensure that the benefits of 5G investment warrant the long-term investment costs? Or to put it another way, how can industries leverage 5G technology to build cost-efficient connected industry on a global scale?
The answer is the intelligent edge. The intelligent edge is the analysis of data and development of solutions at the site where the data is generated. By doing this, the intelligent edge reduces latency, costs and security risks, thus making the associated business more efficient. As 5G puts compute closer to the user (whether that be a human or a device) it enables a new paradigm of capabilities with AI, machine learning and a host of related use cases.
Read More
5G
Article | May 18, 2023
Digital liberation has opened up several avenues for businesses. The current scenario is a bright example of how a remote or hybrid work model seamlessly became a norm, establishing digital workspaces, including laptops and PCs.
But this has also led companies to deal with a lot of challenges in managing their enterprise mobility.
Whether it is the security or Bring Your Own Device (BYOD) to the user experience or migration, Mobile Device Management (MDM) plays a significant role in digital transformation.
PROTECTION VS. PRIVACY: THE PROBLEM WITH (MDM) – INTRODUCTION
Mobile device management pertains to software solutions and reliable practices that enable companies to easily manage and obtain wide-ranging mobile devices in compliance with corporate guidelines.
In addition, the MDM functionality addresses the security of devices and data, management of devices, and configurations.
Essentially, MDM as security is an element of an enterprise mobility management solution that integrates a clustered set of tools to secure and manage mobile apps, BYOD devices, content data and access, configurations, risk management, software updates, and application management.
MDM allows a single-interface control over all connecting devices, enabling each device registered for corporate use through the MDM software to be easily monitored, managed, and controlled as per organizational policies.
“It’s clear that our network is better protected. We have solved our BYOD issues and can rely on great support via e-mail, phone, or Skype.”
- Raymond Bernaert, IT Administrator at ROC Kop van Noord, the Netherlands
However, when it comes to an understanding, this technology is of utmost importance to consider the key challenges that companies face regarding protection vs. privacy of mobile device management.
Key Challenges
MDM solutions are built to improve visibility and secure better control into an end user’s mobile device activity. However, unrestrained tracking of the device’s activities poses a huge threat to the end user’s privacy.
For instance, the mobile device management solution may track real-time location and browsing detail. The information exposes employees’ data and usage habits beyond the employer’s device management and security needs.
Moreover, as the mobile device market expands, employees choose devices from various brands and platforms, which companies extend support and manage; nevertheless, unanticipated security issues with a specific platform and software version could emerge at any point. Thus, executing the entire process without compromising the end-user convenience.
Now, let’s check out some of the most common mobile device management challenges.
Security
Using numerous devices and endpoints could potentially increase the risk of hacking. This is because, for hackers, it would be a lot easier to exploit the endpoints.
And, no wonder mobile device security is one of the fastest-growing concepts in the cybersecurity landscape today.
Incorporating mobile devices under the umbrella of mobile device management would be helpful to bridge the vulnerable gaps and prove to firmly manage the entire digital fleet, including mobile phones and PCs. In addition, this will increase up-time significantly and containerize the personal data from corporate data.
The Privacy Issue
Though MDM solution helps organizations obviate data breaches, they also open up doubt and questions regarding employee privacy. This is because various MDM tools allow employers to monitor the entire device’s activities, including personal phone calls and web activity, at any point.
Subsequently, this empowers the IT team to command control in corporate security, whereby they perform many such remote actions, which harm the employees’ privacy.
Organizations over the years have used mobile device management solutions with the intent to put BYOD in place. When an enterprise enables BYOD, employees use their devices to access data to help achieve the tasks.
With the intent to secure the endpoints, companies choose MDM as their key solution and take control over the entire mobile device, but with that comes the potential for abuse. So, naturally, there is an unwillingness among employees to get MDM installed on their devices.
Network Access Control (NAC)
The sudden surge in digital workspace culture has also brought in additional complications with varied mobile devices.
It is crucial to ensure the team has access to all the apps and corporate data they need. However, it is also important to note that there should be a check on direct access to the data center.
One of the core elements for enterprise mobility is network access control (NAC). NAC scrutinizes devices wanting to access your network and it carefully enables and disables native device capabilities distinctly.
With designated devices getting connected to the network as per resource, role, and location, it is relatively easy for NAC to ascertain their access level based upon the pre-configured concepts.
User Experience
It is essential to consider the end-user experience while managing mobility as it often becomes a big challenge. Therefore, a successful mobile device management structure lies mainly in creating a satisfying user experience.
A company that uses various devices and has extensive BYOD users may find VMware Workspace ONE or MobileIron effective.
However, if the enterprise is all Apple iPhones, the ideal enterprise mobility management would be Jamf Pro, an Apple-only EMM.
A single sign would be a perfect method to get into the virtual desktop to ensure efficiency for the remote workers. Moreover, it won’t ask you to sign into different applications separately.
Sturdy enterprise mobile device management is an absolute necessity to have a hassle-free experience.
Let’s cite the example of this case study, where ‘The Department of Homeland Security (DHS) Science and Technology Directorate’ (S&T) initiated the Next Generation First Responder (NGFR) Apex program to assist tomorrow’s first responder in becoming protected, connected and aware.
DHS S&T held a series of NGFR Integration Demonstrations to incrementally test and assess interoperable technologies presently at the development stage.
These demonstrations have changed from tabletop integration to field exercises with partner public safety agencies incorporating increasingly complex technology.
The NGFR- Harris County OpEx included 23 varied DHS and industry-provided technologies involving six Internet of Things (IoT) sensors, five situational awareness applications and platforms and live-stream video feeds.
Additionally, Opex technologies also integrated body-worn cameras and real-time data aggregation and access across numerous agencies.
In a nutshell, this case study identifies and explains the mobile device management (MDM) solutions that provided an application-level cybersecurity evaluation and remote device management. The Opex addresses how nationwide public safety agencies could utilize MDM to enhance the operational deployment of new devices and applications.
Final Words
There are surely both pros and cons involved in mobile device management.
Over the years, the BYOD program has turned out to become a norm in corporate culture. In addition, the use of personal devices has significantly surged due to the gradual increase in remote and hybrid work models. Thus, many believe that the MDM solution is naturally aligned with BYOD.
However, the fact is, a perfectly planned BYOD policy is the only way to ensure clarity. Having no policy in place will expose a firm to the so-called ‘Shadow IT’ as users will circumvent the IT infrastructure working from their mobile devices.
Though the breach of privacy is likely, the policy can be tailored based on the company’s needs. The IT security is adequately maintained and protected and strikes a balance between protections vs. privacy in mobile device management.
Frequently Asked Questions
What can mobile device management do?
Mobile device management keeps business data safe and protected and secures control over confidential information. MDM also exercises its power to lock and remove all data. This is the capability that sustains the device’s security.
What are different mobile management tools?
With the introduction of Bring Your Own Device (BYOD), several enterprise mobility management tools have also been inducted into MDM.
To name a few, some of the prominent MDM tools are Miradore, Citrix Endpoint Management, and SOTI Mobicontrol.
{
"@context": "https://schema.org",
"@type": "FAQPage",
"mainEntity": [{
"@type": "Question",
"name": "What can mobile device management do?",
"acceptedAnswer": {
"@type": "Answer",
"text": "Mobile device management keeps business data safe and protected and secures control over confidential information. MDM also exercises its power to lock and remove all data. This is the capability that sustains the device’s security."
}
},{
"@type": "Question",
"name": "What are different mobile management tools?",
"acceptedAnswer": {
"@type": "Answer",
"text": "With the introduction of Bring Your Own Device (BYOD), several enterprise mobility management tools have also been inducted into MDM.
To name a few, some of the prominent MDM tools are Miradore, Citrix Endpoint Management, and SOTI Mobicontrol."
}
}]
}
Read More
Enterprise Mobility
Article | June 15, 2023
Asia stands out as home to a handful of telcos busy building an international business out of selling their internally developed IT platforms. Leading the way are Jio in India, Japan’s Rakuten and Singapore operator Singtel.
Having built their own businesses, they are now selling their platforms to support new 5G business models for enterprises and other operators. In the case of Singtel, this means its 5G multi-access edge computing (MEC) services, based on Paragon, its orchestration platform for enterprise services.
Manoj Prasanna Kumar, Head of Enterprise Platforms at Singtel, who is responsible for the Paragon platform, discusses in this article the company’s enterprise service ambitions, how it’s partnering with global enterprise software vendors and the obstacles it still sees to 5G B2B service uptake.
Paragon, which falls under the telco’s DigitalInfraCo arm, aims to give enterprises “a single pane of glass that provides an end-to-end view and control of the network, the edge and the application ecosystem,” says Manoj. “It opens up the edge to the enterprise world, allowing them to deploy either their own applications or applications from Singtel's ecosystem.”
Launched last year, Paragon also lets telcos orchestrate end-to-end 5G enterprise networking services in combination with applications from software and cloud computing partners. Paragon’s application partners include Amazon Web Services, Intel, Microsoft and SAP, and the platform is available to every 5G enterprise user within the Singtel Group.
Singtel’s bet is that a growing number of enterprises will need a tightly intertwined combination of 5G connectivity and cloud computing on the edge to run specific vertical applications.
“Our strategy is to become a super aggregator of MEC,” says Manoj. “We focus on high throughput, low latency use cases, such as video analytics or streaming, mixed reality and virtual reality which pump data into the back-end applications and where the decision-making cannot afford even a few milliseconds of extra latency.”
In addition to Paragon, Singtel Group’s investments in 5G infrastructure and service delivery include a national 5G standalone (SA) network, covering more than 95% of Singapore, and international investment in data centers to support cloud computing on the network edge. Today, there are signs that its investments in 5G enterprise services are starting to bear fruit. In the second half of the 2022/23 financial year, which ended on 31 March, Singtel reported that higher demand for technology solutions and 5G services contributed to ICT revenue growth of 11%, with ICT revenues contributing 23% of Singtel Group’s overall enterprise revenue.
Singtel scored a notable win for the Enterprise 5G offering powered by Paragon platform last year when Silicon manufacturer Micron said it would deploy it and Singtel’s 5G campus network infrastructure to support its smart manufacturing operations. Micron is using Singtel’s solution to help manage and analyze its manufacturing processes for enhanced efficiency. Likewise, Singtel recently announced Hyundai as another customer for their Enterprise 5G offering powered by the Paragon platform to deliver digital twin for their electric vehicle manufacturing plant in Singapore for advanced manufacturing operations.
Nonetheless, Manoj recognizes that challenges remain when it comes to growing the 5G enterprise business. “5G and edge in Singapore have had quite a good start. But I would say we've got a long way to go,” he says.
Convincing customers
One of the biggest obstacles is generating customer demand. After all, just because enterprises are able to set 5G connectivity parameters on demand or use MEC for 5G applications at the click of a button doesn’t mean they see a reason to do so.
“Many customers don't have a lot of awareness of how edge computing can really transform their business and how a few milliseconds of latency can actually save money for them, make them more efficient, and reduce errors and so on,” says Manoj.
This reality has shaped Singtel’s sales process. “We spend quite a lot of time in raising awareness amongst customers,” he explains. “We never start with what 5G can do. Instead, we focus on understanding their challenges, their current processes, what gaps there are, and…start with applications that can help solve their problems.”
Another challenge is a lack of 5G-native devices. “This puts us in a very tough spot because when we go and connect devices to wi-fi hotspots, and then use 5G as backhaul, customers often ask ‘isn't this similar to wi fi? Why do I need 5G?’” He adds: “It will be a bit of a roadblock…for all telcos until the 5G-native device ecosystem matures.”
There is also a need for software applications that can perform optimally on 5G and the edge, and switch between network slices with different payloads. “There is a little bit of hand holding required when we bring in an ISV to qualify their application so that it can benefit from all the capabilities of 5G and the edge,” says Manoj.
And then there are the engineering challenges associated with orchestration. Paragon sets out to automate much of the orchestration and management capabilities that make it possible to request quality of service on demand for specific applications and use cases. But here again, success is dependent on close partnerships with third parties.
“Strategic partnerships with Ericsson on the network side and with Intel, Microsoft and AWS help us boost the infrastructure and the application side to stitch together the network and the infrastructure capabilities,” explains Manoj.
Choosing your vertical
Singtel is currently targeting three strategic verticals: manufacturing, public safety and urban planning. Its choice reflects the opportunities in both Singapore and the domestic markets of members of the Singtel Group.
“In Singapore, we are lucky because both enterprises and the government are very, very future-looking and invest quite a lot in adopting new technology,” says Manoj. In particular, “public sector customers are more motivated to explore something new because they carry the digital footprint of the country,” he says.
And because governments operate public safety and urban planning systems at a national level, the promises are on enough scale to spur third parties to invest in developing devices and software applications. Typical public safety use cases include video analytics, surveillance systems and robotics applications; urban planning covers systems such as traffic management.
Some of the enterprise applications Singtel sees gaining traction include immersive B2B2C content, such as delivering real-time analytics to gamers via a 360-degree video feed or mixed reality applications to train factory workers on how to troubleshoot to use complex equipment. “If they need an augmented overlay of information through the camera feeds then they need 5G and edge because a lag will make users nauseous,” explains Manoj. Other promising use cases include autonomous drones and robots.
Singtel has drawn on standard APIs, including TM Forum’s Open APIs, CAMARA APIs to build Paragon. Manoj encourages both technology standardization and collaboration with hyperscalers and software vendors to grow the enterprise market.
“Telcos should be embracing tech players as partners, seeing them as catalysts of more pull through on their services,” says Manoj. “When you partner with them, you expose your services on the hyperscale infrastructure, you naturally work with developers, which allows telcos to expand the services market.”
Read More
Article | May 19, 2021
In today’s shop-from-anywhere world, the model for success continues to change. Tried and true techniques are becoming obsolete as consumer expectations evolve, demand volatility rises, and supply chain disruptions become more frequent. Retailers are also dealing with online shopping surges that add new complexities to existing data strategies due to an influx of raw, unprepped, and largely underutilized data.
Read More