As personal and professional lives converge, organisations are looking into how they can support the 'Bring Your Own Device' (BYOD) approach at the workplace. And this requires a well-defined and effective re-look mobility that taps the productivity and growth potential of mobile devices used by employees, corporate customers and consumers.
Companies are looking at how their existing infrastructure can or needs to be enhanced to support mobility. For instance, they may be using traditional infrastructure management tools which are not designed to provide the flexible access policies that personally owned devices require. Also, the influx of 802.11n Wi-Fi devices places increased demands on the enterprise network, necessitating design changes.
Security is another top concern, with organisations looking at tools that enable centralised functionality, logging, monitoring, and reporting, as well as ease of deployment. Additionally, they will look to automate the user/device on-boarding process to minimise user disruption and obtaining real-time reporting of their BYOD traffic and security.
Additionally, businesses will be requiring an enterprise application store which they can populate with approved applications for employees to download, including those developed in-house.
HP provides mobility consulting services that start with helping organisations to clearly define an effective mobility strategy (if one is not yet in place or needs to be updated).
With this strategy in place, the next step will be to look at the following:
1) Configuration management ensures all managed devices are configured to comply with corporate guidelines. This includes mail settings, device security policies, restrictions for applications and use, corporate VPN and WiFi settings, and device enrollment.
2) Security management sets the security configuration of the mobile device, aligning with corporate security policies. Password and policy enforcement, on-device encryption, and remote lock/wipe capabilities along with other security functions are included. Certificate-based authentication also is supported.
3) Inventory management provides the IT administrator with a granular view into device hardware and software status. Several report options are available covering devices and applications under management, policies, and compliance.
4) Support management provides device and service monitoring and advanced troubleshooting. User self-service and advanced administration are included as well as support for escalated incidents.
5) Infrastructure management enables HP to oversee solution server infrastructure management and solution software operation. Patch, backup, and security management are included in this component.
Application management enables IT to centrally distribute, install, maintain, and support native applications. This option includes whitelisting and blacklisting. HP can also provide an enterprise applications catalog for in-house applications, built specifically for the enterprise.
Sign up for CIO Asia eNewsletters.