When Apple introduced iOS 9 in September, an unheralded but significant feature was included: the ability to assign apps to unique device identifiers rather than specific Apple IDs. This functionality allows companies to distribute apps to individual devices with little to no intervention on behalf of the end user.
Previously an absolute requirement of nearly any deployment, the Apple ID was doubly important since nearly every Mobile Device Management solution (MDM) requires an “agent.” Once downloaded from the App Store, agents patrol for common security breaches, such as “jailbreaking” devices, and allow devices to be found on a map through geolocation; without an agent, these imperative abilities are nonexistent. Continue Reading…
VMworld was jam packed this year, with more than 22,000 attendees from 85 countries traveling to San Francisco — the largest crowd to date. Every session my colleagues and I attended was standing room only, with customers and partners alike packing the rooms to capacity. It’s truly a testament to the esteem VMware has garnered in the IT industry.
Last week we shared with you some of the biggest announcements and new products VMware introduced. Now we’ll review some of the other highlights and news from the event, offer a glimpse of the future of IT we saw at VMworld, and explain how you can make the most of the announcements and future insights.
1. The VMware vCloud Air Network debuts.
The VMware vCloud Air Network builds upon the company’s VMware Service Provider Program (VSPP) to offer more flexibility for organizations turning to hybrid cloud solutions. The result is the world’s largest network of validated cloud services based on VMware technologies.
What this means for you: Organizations can take advantage of incremental services from other providers using the vCloud Air Network while maintaining their existing internal VMware infrastructure. This also creates greater flexibility for organizations that must keep data in state or country due to compliance rules. Continue Reading…
In this era of tech-savvy business people using their personal devices to work, employees are concerned that if they lose their device — or if it’s stolen — the company will wipe it clean to protect any sensitive company data. Now, it’s not a mobile device management (MDM) manager’s job to care if a few personal pictures get lost, but they should realize that end users do care, and as a result might attempt to circumvent the MDM to keep their personal contacts, photos, and other information safe.
MDM suppliers are looking to secure smart devices from the application layer because of this shift in mentality to keep personal and corporate information separate. It’s a double-edged sword, because employees want an unobtrusive tool that doesn’t contain a lot of oversight but also allows IT to stay up-to-date on their organization’s security requirements.
Can you be non-intrusive and secure?
The most requested feature of 2012 we heard from customers was the ability to wipe corporate data off of a device without deleting the contents of the entire device. That’s been the problem so far with most MDM solutions – they treat the device as a single container and make it work in a way that the organization dictates. With the shift to managing the applications, you give the user a chance to use the device as they intended, while allowing for extra management of content and security.
One problem that arises when you look further into application management is that app markets like the Google Play Store do very little in terms of vetting applications before they’re made available to the public. Though they’re making a more concerted effort now than a few months ago, the amount of oversight is still fairly low. From an MDM perspective, if you knew the name of an application you could add it to a blacklist, but malicious applications tend to multiply by the thousands every day. It would be nearly impossible to block them all. Continue Reading…