5G
Article | September 28, 2023
Digital liberation has opened up several avenues for businesses. The current scenario is a bright example of how a remote or hybrid work model seamlessly became a norm, establishing digital workspaces, including laptops and PCs.
But this has also led companies to deal with a lot of challenges in managing their enterprise mobility.
Whether it is the security or Bring Your Own Device (BYOD) to the user experience or migration, Mobile Device Management (MDM) plays a significant role in digital transformation.
PROTECTION VS. PRIVACY: THE PROBLEM WITH (MDM) – INTRODUCTION
Mobile device management pertains to software solutions and reliable practices that enable companies to easily manage and obtain wide-ranging mobile devices in compliance with corporate guidelines.
In addition, the MDM functionality addresses the security of devices and data, management of devices, and configurations.
Essentially, MDM as security is an element of an enterprise mobility management solution that integrates a clustered set of tools to secure and manage mobile apps, BYOD devices, content data and access, configurations, risk management, software updates, and application management.
MDM allows a single-interface control over all connecting devices, enabling each device registered for corporate use through the MDM software to be easily monitored, managed, and controlled as per organizational policies.
“It’s clear that our network is better protected. We have solved our BYOD issues and can rely on great support via e-mail, phone, or Skype.”
- Raymond Bernaert, IT Administrator at ROC Kop van Noord, the Netherlands
However, when it comes to an understanding, this technology is of utmost importance to consider the key challenges that companies face regarding protection vs. privacy of mobile device management.
Key Challenges
MDM solutions are built to improve visibility and secure better control into an end user’s mobile device activity. However, unrestrained tracking of the device’s activities poses a huge threat to the end user’s privacy.
For instance, the mobile device management solution may track real-time location and browsing detail. The information exposes employees’ data and usage habits beyond the employer’s device management and security needs.
Moreover, as the mobile device market expands, employees choose devices from various brands and platforms, which companies extend support and manage; nevertheless, unanticipated security issues with a specific platform and software version could emerge at any point. Thus, executing the entire process without compromising the end-user convenience.
Now, let’s check out some of the most common mobile device management challenges.
Security
Using numerous devices and endpoints could potentially increase the risk of hacking. This is because, for hackers, it would be a lot easier to exploit the endpoints.
And, no wonder mobile device security is one of the fastest-growing concepts in the cybersecurity landscape today.
Incorporating mobile devices under the umbrella of mobile device management would be helpful to bridge the vulnerable gaps and prove to firmly manage the entire digital fleet, including mobile phones and PCs. In addition, this will increase up-time significantly and containerize the personal data from corporate data.
The Privacy Issue
Though MDM solution helps organizations obviate data breaches, they also open up doubt and questions regarding employee privacy. This is because various MDM tools allow employers to monitor the entire device’s activities, including personal phone calls and web activity, at any point.
Subsequently, this empowers the IT team to command control in corporate security, whereby they perform many such remote actions, which harm the employees’ privacy.
Organizations over the years have used mobile device management solutions with the intent to put BYOD in place. When an enterprise enables BYOD, employees use their devices to access data to help achieve the tasks.
With the intent to secure the endpoints, companies choose MDM as their key solution and take control over the entire mobile device, but with that comes the potential for abuse. So, naturally, there is an unwillingness among employees to get MDM installed on their devices.
Network Access Control (NAC)
The sudden surge in digital workspace culture has also brought in additional complications with varied mobile devices.
It is crucial to ensure the team has access to all the apps and corporate data they need. However, it is also important to note that there should be a check on direct access to the data center.
One of the core elements for enterprise mobility is network access control (NAC). NAC scrutinizes devices wanting to access your network and it carefully enables and disables native device capabilities distinctly.
With designated devices getting connected to the network as per resource, role, and location, it is relatively easy for NAC to ascertain their access level based upon the pre-configured concepts.
User Experience
It is essential to consider the end-user experience while managing mobility as it often becomes a big challenge. Therefore, a successful mobile device management structure lies mainly in creating a satisfying user experience.
A company that uses various devices and has extensive BYOD users may find VMware Workspace ONE or MobileIron effective.
However, if the enterprise is all Apple iPhones, the ideal enterprise mobility management would be Jamf Pro, an Apple-only EMM.
A single sign would be a perfect method to get into the virtual desktop to ensure efficiency for the remote workers. Moreover, it won’t ask you to sign into different applications separately.
Sturdy enterprise mobile device management is an absolute necessity to have a hassle-free experience.
Let’s cite the example of this case study, where ‘The Department of Homeland Security (DHS) Science and Technology Directorate’ (S&T) initiated the Next Generation First Responder (NGFR) Apex program to assist tomorrow’s first responder in becoming protected, connected and aware.
DHS S&T held a series of NGFR Integration Demonstrations to incrementally test and assess interoperable technologies presently at the development stage.
These demonstrations have changed from tabletop integration to field exercises with partner public safety agencies incorporating increasingly complex technology.
The NGFR- Harris County OpEx included 23 varied DHS and industry-provided technologies involving six Internet of Things (IoT) sensors, five situational awareness applications and platforms and live-stream video feeds.
Additionally, Opex technologies also integrated body-worn cameras and real-time data aggregation and access across numerous agencies.
In a nutshell, this case study identifies and explains the mobile device management (MDM) solutions that provided an application-level cybersecurity evaluation and remote device management. The Opex addresses how nationwide public safety agencies could utilize MDM to enhance the operational deployment of new devices and applications.
Final Words
There are surely both pros and cons involved in mobile device management.
Over the years, the BYOD program has turned out to become a norm in corporate culture. In addition, the use of personal devices has significantly surged due to the gradual increase in remote and hybrid work models. Thus, many believe that the MDM solution is naturally aligned with BYOD.
However, the fact is, a perfectly planned BYOD policy is the only way to ensure clarity. Having no policy in place will expose a firm to the so-called ‘Shadow IT’ as users will circumvent the IT infrastructure working from their mobile devices.
Though the breach of privacy is likely, the policy can be tailored based on the company’s needs. The IT security is adequately maintained and protected and strikes a balance between protections vs. privacy in mobile device management.
Frequently Asked Questions
What can mobile device management do?
Mobile device management keeps business data safe and protected and secures control over confidential information. MDM also exercises its power to lock and remove all data. This is the capability that sustains the device’s security.
What are different mobile management tools?
With the introduction of Bring Your Own Device (BYOD), several enterprise mobility management tools have also been inducted into MDM.
To name a few, some of the prominent MDM tools are Miradore, Citrix Endpoint Management, and SOTI Mobicontrol.
{
"@context": "https://schema.org",
"@type": "FAQPage",
"mainEntity": [{
"@type": "Question",
"name": "What can mobile device management do?",
"acceptedAnswer": {
"@type": "Answer",
"text": "Mobile device management keeps business data safe and protected and secures control over confidential information. MDM also exercises its power to lock and remove all data. This is the capability that sustains the device’s security."
}
},{
"@type": "Question",
"name": "What are different mobile management tools?",
"acceptedAnswer": {
"@type": "Answer",
"text": "With the introduction of Bring Your Own Device (BYOD), several enterprise mobility management tools have also been inducted into MDM.
To name a few, some of the prominent MDM tools are Miradore, Citrix Endpoint Management, and SOTI Mobicontrol."
}
}]
}
Read More
Wireless, 5G
Article | May 18, 2023
The third Annual OCP China Day, organized by the Open Compute Project (OCP) Foundation and hosted by Inspur, will be held on July 27, 2021 in Beijing. It marks another step in the right direction to popularizing open computing across the globe. This year is the tenth anniversary of the open compute project and the theme of OCP China Day is “Open compute for a new decade: Decarbonization, Efficiency, Adoption”.
Omdia has tracked the open computing market in detail for 5 years and over that period we have seen the end-user base expand and adoption take off. We expect 40% of the servers shipped in 2025 to be developed based on open standard, up from 7% in 2016. This is a very significant number, partularly given that our forecast takes into account large scale adoption at only two or three of the hyperscale cloud service providers. Most of the net new deployments are expected to be at tier-2 cloud, communication service providers and enterprises, including the public or government sector.
Read More
Enterprise Mobility
Article | June 15, 2023
Discover network intrusion monitoring with top network monitoring books. Explore insights, best practices, and tools to secure network visibility and processes used in monitoring network performance.
Observing networks for performance and security anomalies is crucial for businesses that rely on their business network. Network monitoring solutions monitor performance metrics across an entire network to guarantee that your systems operate properly. From monitoring network performance to ensuring comprehensive visibility, the books listed below will offer a wealth of knowledge and expertise to empower professionals in the networking industry.
10 Network Monitoring Books to Effectively Monitor Performance
1 Zabbix Network Monitoring
Author: Rihards Olups
Zabbix Network Monitoring book is an indispensable resource for networking professionals seeking to enhance their network visibility and improve network performance monitoring. This comprehensive guide offers an approach to effectively monitor network devices and applications using Zabbix 3.0. One of the network monitoring books, Zabbix Network Monitoring covers essential topics such as data collection, native Zabbix agents, and SNMP devices. It also delves into monitoring Java application servers, VMware, notifications, permission management, system maintenance, and troubleshooting. It empowers readers to build a robust network monitoring solution to gather data from various systems. By exploring the intricacies of Zabbix, this book ensures that network monitoring becomes an efficient and effortless task, ultimately enhancing network visibility and performance for all stakeholders.
2 The Practice of Network Security Monitoring
Author: Richard Bejtlich
An essential book for networking professionals, The Practice of Network Security Monitoring: Understanding Incident Detection and Response, helps to enhance network visibility and strengthen network security. The book's author, Richard, guides readers through implementing network security monitoring (NSM) as a proactive defense strategy. The book emphasizes integrating NSM into security measures to effectively detect and respond to intrusions. It also provides practical insights on deploying, building and operating an NSM operation using open-source software and vendor-neutral tools. With a focus on proactive incident response, this book equips readers with the knowledge and techniques to establish a robust security net that detects, contains and controls attacks. By implementing the practices outlined in this book, organizations can better safeguard their networks and prevent the loss of sensitive data.
3 Internet and Network Architecture
Author: Sang Hinch
Internet and Network Architecture: Analyzing Performance with Network Monitoring Tools is a must-read for professionals in the networking industry seeking to enhance network visibility and optimize network performance monitoring. This comprehensive guide offers a thorough introduction to TCP/IP, FTP, IP addresses, ports, and web page retrieval, providing a solid foundation in internet and network architecture. The book explores the complex workings of routers, data transmission, network configuration, and architecture, enabling readers to build efficient and secure networks. Focusing on practicality, it emphasizes using network monitoring tools to analyze performance and troubleshoot issues effectively. By mastering the fundamentals presented in this book, readers will gain the knowledge and confidence to navigate the World Wide Web, understand network protocols, and make informed decisions for network optimization.
4 Zabbix 4 Network Monitoring
Author: Patrik Uytterhoeven & Rihards Olups
Zabbix 4 Network Monitoring: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0, 3rd Edition is a comprehensive and highly valuable resource for professionals in the networking industry. This book serves as an essential guide to effectively monitor the performance of network devices and applications using Zabbix 4.0. Written for both beginners and experienced users, the book offers a step-by-step approach to help readers quickly grasp the installation process and explore the new features of network monitoring. From understanding native Zabbix agents and SNMP devices to harnessing Zabbix's integrated functionality for monitoring Java application servers and VMware, readers will gain comprehensive knowledge. With insights into optimizing performance, automating configurations, and troubleshooting network issues, it will develop advanced skills to ensure a healthy and efficient network.
5 Applied Network Security Monitoring
Author: Chris Sanders & Jason Smith
An indispensable book for professionals in the networking industry Applied Network Security Monitoring: Collection, Detection, and Analysis offers a comprehensive guide to become a proficient NSM analyst. Focusing on NSM's collection, detection, and analysis stages, this book equips readers with essential concepts through real-world examples and practical scenarios. Recognizing that prevention is not foolproof, the book emphasizes the critical role of detection and response in minimizing the impact of network intrusions. With insights from experienced NSM professionals and access to sample data, readers gain valuable knowledge to analyze network security incidents effectively. From data collection methods to in-depth coverage of tools like Snort, Suricata, Bro-IDS, SiLK, and Argus, this monitoring book provides hands-on experience and practical examples using real PCAP files. By leveraging Security Onion for lab examples, readers can develop and enhance their analytic techniques.
6 Practical Network Security Monitoring: Using Free Software
Author: Elizabeth Graham
Practical Network Security Monitoring: Using Free Software offers guidance on utilizing free software to collect, monitor, and analyze network traffic, thereby detecting and identifying potential threats. With a focus on providing practical exercises, this book equips beginner to intermediate users with the necessary knowledge to detect and defend cyber threats. Step-by-step instructions enable readers to install, configure, and effectively use free tools, allowing hands-on experience in analyzing network traffic and identifying malicious activity. This book edition covers Security Onion, introducing significant changes to the platform. The updated content includes new intrusions, malware, PCAP examples, and an introduction to web-based PCAP analysis tools. A bonus chapter challenges readers to test their knowledge through self-assessment.
7 Efficient Body Sensor Networks for Patient Monitoring
Author: Jawaid Iqbal
Efficient Body Sensor Networks for Patient Monitoring is a book for professionals in the networking and healthcare industry, focusing on the challenges, Body Sensor Networks (BSNs) face in continuously monitoring patient vital signs. BSNs operate in constrained environments and encounter issues such as patient information privacy, secure data transmission over public networks, high overhead, and energy constraints. Being one of the prominent network monitoring books, it presents five efficient and secure attribute-based schemes designed explicitly for BSNs. These schemes address the mentioned challenges comprehensively, providing practical solutions to enhance network monitoring performance in patient monitoring scenarios. By proposing novel approaches, this book contributes to the advancement of efficient and secure patient monitoring within BSNs.
8 Mastering Python Networking
Author: Eric Chou
A comprehensive guide created for professionals in the networking industry seeking to leverage Python for network automation, monitoring, and management, Mastering Python Networking: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management, focuses on the latest Python libraries and frameworks and equips readers with the necessary skills to tackle common & complex network challenges effectively. From interacting with network devices to implementing advanced features using Python 3, the book covers a wide range of topics, including Docker containers, network data analysis, cloud networking, and DevOps practices. With practical examples and insights into tools like GitLab & ELK, network engineers, developers, and SREs will gain valuable knowledge to enhance their network performance monitoring and visibility.
9 AWS Security Cookbook
Author: Heartin Kanikathottu
Focusing on securing Amazon Web Services (AWS) infrastructure, AWS Security Cookbook: Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS is written. Being one of the network monitoring books that provide professionals with valuable insights related to network visibility and network performance management in the networking industry, this book offers practical solutions to address common security challenges, including permission policies, key management, network security, and cloud security best practices. Industry professionals can explore various AWS services and features that enhance security, including IAM, S3, CloudWatch, CloudTrail, Config, GuardDuty, and Macie. In addition, the book also covers compliance requirements and demonstrates how to maintain security and compliance using AWS security services.
10 The Best of TaoSecurity Blog, Volume 2
Author: Richard Bejtlich
The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent Threat, guides professionals in the networking industry, particularly those interested in network security monitoring. Written by Richard Bejtlich, a renowned cybersecurity expert, he curates the best entries from his 17 years of writing on the TaoSecurity Blog. The book explores various intervention detection and response aspects, leveraging threat intelligence sources, network data, application and infrastructure data, and endpoint data. Additionally, it provides insights into Chinese hacking activities over the past two decades, offering a unique perspective from a defender on the front lines. With new analysis accompanying each post, readers can gain valuable knowledge on the evolution of the security industry, defensive methodologies, and strategies for enhancing national security.
Conclusion
In conclusion, the recommended books discussed in this article provide valuable insights and guidance for networking experts in the B2B sector. These resources cover various aspects of monitoring network performance, enhancing network visibility, and addressing security concerns. By delving into these monitoring books, professionals can gain a deeper understanding of effective network performance monitoring techniques, ensuring optimal visibility across their infrastructure. With the ever-evolving networking landscape, staying up-to-date with the latest trends and best practices, it is crucial for maintaining a high-performing network. These books offer industry-relevant knowledge and empower networking experts to make informed decisions, ultimately leading to a robust and efficient network infrastructure.
Read More
Article | May 20, 2021
Demand for data center compute continues to be strong and we believe 1Q21 would have been even stronger had it not been for the semiconductor supply shortage. We learned from vendors that the flow of server CPUs out of TSMC and Intel’s fabs was steady in 1Q21 but supply of other components necessary to build a server was tight, including power semis, BMC and PCB substrate.
Read More