Transforming mobility management through a unified approach
It’s no secret: People who use mobile devices are industrious. To capitalize on all that productivity, enterprises need to provide employees with access to corporate data and applications anytime, anywhere. But there’s a catch. As a plethora of smartphones, tablets, laptops and desktops enters mainstream use — each with different operating systems — the task of managing and controlling these devices becomes unwieldy.

The situation is compounded when employees resist corporate control and security policies that impede productivity or appear to encroach on personal privacy. Organizations need ways to expand access to corporate networks and increase user adoption of enterprise solutions without exposing the organization to a large and growing array of threats.

IT groups also must account for changing mobile enablement strategies. Many organizations are beginning to implement choose-your-own-device (CYOD) programs and allow employees themselves to manage corporate-issued devices. At the same time, the rise in adoption of bring-your-own-device (BYOD) policies has employees clamoring to use personally owned devices for work, and many organizations recognize the potential productivity and cost advantages of the BYOD approach.

In the midst of constant change, IT groups must continuously adjust the way they provision devices, deploy enterprise applications, enable remote access, secure corporate information and more. Many IT organizations add point solutions for mobile device management and security as the need arises. But a piecemeal approach that involves managing multiple vendor relationships also can saddle IT teams with solutions that don’t talk to each other or fail to address evolving enterprise requirements.

Organizations must have the flexibility to accommodate a wide range of variables today and lay the groundwork for future developments. A big piece of the puzzle is accommodating effective mobile enablement strategies to support the influx of diverse devices, operating systems and work habits. IT groups need a way to provision, manage and secure devices, data and applications — and the flexibility to handle functions independent of the mobile enablement strategies and devices supported today or tomorrow. At the same time, IT leaders have the opportunity to improve connectivity and empower line-of-business owners with the productivity and collaboration tools they need to help their teams excel.

Flexible, end-to-end management

To help organizations deal with a complex and changing landscape, Dell Enterprise Mobility Management (EMM) enables IT groups to implement security and management capabilities that match precise requirements. Dell EMM is a comprehensive mobile enablement solution built with field-tested, leading-edge security and management technology designed to support a variety of devices, operating systems, worker requirements and profiles.

Dell EMM integrates common functions for managing corporate-issued or personally owned endpoints, as well as enterprise workspaces, or containers, that isolate enterprise resources from the personal operating environment (see figure):

  • Mobile device management (MDM)
  • Mobile application management (MAM)
  • Mobile content management (MCM)
  • Endpoint systems management (ESM)
  • Secure access to corporate resources
  • Integrated management console
  • End-user self-service
  • Real-time, consolidated reporting and alerts

 

 

Dell Enterprise Mobility Management: Flexible management and security for current and evolving mobility/BYOD strategies
Dell Enterprise Mobility Management: Flexible management and security for current and evolving mobility/BYOD strategies

 

Facilitating BYOD

Dell EMM lets administrators take a traditional approach to endpoint management. However, in cases such as a BYOD environment, administrators can manage a secure enterprise workspace on the device instead of managing the entire device.

Dell EMM provides a container for personally owned smartphones, tablets and laptops. The container — which includes managed encryption, policy management and data loss protection (DLP) — separates enterprise data and applications from personal data and applications and helps simplify integration with existing IT infrastructure and processes.

The container benefits end users as well. They can access the corporate resources they need simply by downloading an easy-to-use, noninvasive app. The container helps assure end users that their privacy won’t be violated and their personal data won’t be compromised, especially in the instance of a remote wipe — which takes place inside the container only. Employees get the tools and privacy they want so they can embrace the organization’s security measures instead of trying to work around them.

By enabling offline productivity, container-based solutions support an increasingly mobile workforce that often must deal with poor internet connectivity while traveling. Containers allow workers to capitalize on a responsive, native-like experience wherever they are. In addition, containers help organizations accommodate a diversity of device types, including smartphones and small tablets, for which virtualization solutions are often a poor fit because of small screen size.

For BYOD smartphones and tablets, the container is designed to provide built-in, secure remote access with DLP and a single, secure corporate mobile app for productivity and collaboration. The app includes email, calendar, contacts, secure mobile browser and secure local file explorer.

While smartphone and tablet operating systems allow for fewer changes from IT than PC operating systems, laptops and desktops may require deployment of a full corporate OS image. For that reason, the container for BYOD laptops and desktops delivers a corporate Windows image that can be installed in an Apple® Mac OS® or Windows environment.

Controlling complexity

Unlike point solutions, Dell EMM is designed to simplify endpoint management and security through a unified approach.

Wide range of management options. Dell EMM enables administrators to manage everything from smartphones, tablets and containers to laptops and desktops, regardless of who owns the endpoint. Moreover, administrators can decide how they manage each endpoint, whether by user identity or use case.

Integration of field-tested technologies. Dell has integrated its best-of-breed intellectual property (IP) for management and security into Dell EMM.

Industry-leading security. Woven across Dell EMM are advanced security functions that can be controlled from a centralized management console, including setting up configurations, policies, data loss protection, secure remote access, encryption and passwords.

Single-vendor support. Working with a single vendor helps ensure integration of capabilities and management consoles, streamline deployment and simplify support.

Comprehensive professional services. Dell offers Image Consulting services to help organizations create and manage images deployed to personal devices. Dell Client Mobility and BYOD Consulting assists IT leaders in analyzing organizational needs and defining a road map for mobility technologies. EMM Migration Consulting from Dell helps smooth the move from a current management service to EMM. The Dell Mobility User Experience Prototype Workshop is designed to provide IT leaders with a clear landscape of their requirements and produce visual mock-ups of desired solutions. And Dell has established a Mobility Center of Excellence that delivers the resources necessary to help IT decision makers become mobility experts, enhancing their partnership with line-of-business owners and end users.

Mobile strategy support for today and tomorrow

As mobile technologies and work habits continue to evolve, IT leaders need ways to accommodate existing requirements, prepare strategies for change and protect investments. Dell EMM provides the tools needed to enhance mobile device security and management in several ways:

  • Comprehensive endpoint management: The mobile enablement capabilities of Dell EMM streamline administrative functions while also helping IT understand which devices employees are using and how they are using them.
  • Secure enterprise environment: Dell EMM provides the flexibility to support an array of current technologies plus technologies that may not yet have been implemented, such as machine-to-machine (M2M) management. Dell EMM also enables administrators to deploy and support the business applications and services end users need.
  • Protected access to data: Embedded security features, such as secure remote access and encryption, as well as containerization capabilities, help keep corporate information, applications and networks safe.
  • Heightened management efficiency: A centralized management console helps control the complexity that can come with expanding mobility or BYOD programs; user self-service functions offload tasks from IT. Integrated capabilities enable components to be added seamlessly, avoiding time-consuming integration work.
  • IT innovation: Dell EMM facilitates innovation by supporting diverse devices as well as emerging technologies. With Dell EMM, IT groups can deliver a responsive, modern experience for a growing range of use cases.

Through Dell EMM, IT leaders can be ready to support evolving mobile enablement strategies designed to provide secure anytime, anywhere access from a changing mix of devices — while helping simplify administration.

 

Roger Bjork is director of global product marketing, responsible for overall mobility/BYOD solutions for Dell.

 

Learn more

Dell Enterprise Mobility Management:
Dell.com/EMM

Dell Client Mobility Solutions Consulting:
qrs.ly/3k41rm8

Dell Mobility Solutions:
www.dellmobilitysolutions.com

 

Download a PDF version of this article here.

 

Dell and KACE are trademarks of Dell Inc.