Device Security

Former Employee

There’s little disagreement that mobile technologies are beneficial to business. Mobility means flexibility and productivity gains and a sense of control for employees. Mobile is more than just smartphones. With IoT, more devices like smartwatches, tablets, and manufacturing equipment are enabled to access networks and provide information to individuals through multiple channels. In many ways, this has changed the “boundaries” of the workplace, which make managing enterprise data more complex.


An IBM study found that 62% of IT leaders with a well-defined mobile strategy achieve ROI in 12 months or less. Harnessing the power of mobile devices can improve the flexibility and productivity of employees, while sound Mobile Device Management protects an enterprise from security threats.


How are companies approaching mobility?

A recent Gartner study found that 66% of employees currently use their own devices at work. From a productivity, cost and employee satisfaction perspective, allowing employees to bring their own devices is beneficial. Mobile access means that companies can work beyond the walls of their cubicles and can more easily access information on the go. Employees are more likely to be comfortable navigating their own devices and for the IT department, it drives fewer device set-up and maintenance costs. However, the benefits are not without risks.



Increasing the number of devices with access to a network makes managing and securing those devices more complicated. Identifying the number of devices on the network, configuring these devices to comply with company policies, granting access to internal information, as well as protecting these devices from outside threats pose many challenges.


Another risk, less tangible but certainly impactful, is employee compliance and overall satisfaction. Even if corporations provide devices, many employees are still prone to carry their own devices with them, or find work arounds. Transparency around device policies and security risks can help convey the risks to non-compliant or resistant employees. If deployed properly, BYOD policies can meet employee needs and still protect the network from external threats.


This month on Tech Community, we’ll be discussing mobile device management, productivity gains from a mobile-first world, and the security challenges (among other challenges) that go along with managing an ever-growing network of devices.


How does your company approach mobility and what are the challenges and successes you’ve had?

1 Reply
We were confused how to approach devices and the buzz around BYOD. We do not own the mobile devices for employees, yet they require to access corporate information on their devices.
Now, with the big Office 365 roll out we are planning, it is not only emails that reside on mobile devices, but documents and many collaboration tools.

As security is a concern nowadays, and with the new privacy laws in Europe, the challenges are great than ever.

We looked at many device management solutions in the market like AirWatch, but again, we cannot actually enroll employee's devices with a device enrollment agent, simply because we do not own that device.

We are getting a lot of resistance form the management about enrolling personal devices.

The solution we proposed is to get licenses for Intune, and adopt the Mobile Application Management (MAM) approach. This would simplify our management solution, protect corporate information on mobile devices, and respect any privacy concerns for employees.

Intune MAM is the only and best solution that provides comprehensive solution for a big company like ours, with thousands of employees across the globe.

Thanks for giving me the chance to share my story :)

Ammar Hasayen