Purely Practical MDMs (Mobile Device Management)

by | Oct 4, 2021 | Device Security, Managed Security Service Provider, Mobile Devices, MSSP

Charles Kanu

Charles Kanu

Desktop Support Specialist

Time is of the essence.

As a Desktop Support Specialist of a network security firm, my profession is something like being an EMT for computer networks. On any given day a crisis can come up. The crisis can be unique, and we have to be ready to respond to all sorts  of calamities. Time is always of the essence. Our job is to be familiar with all kinds of different attacks and failure scenarios, and respond quickly with the right treatment.

 

The rate at which technology is advancing makes it hard to keep up with all the ways a network can be compromised, but there are some tools that help a lot. Office networks are no longer just made up of desktops and servers, they are now made up of every smart phone, laptop, random Bluetooth device, and appliance programmed to be able to connect. One of the biggest challenges to protecting a network is to keep up with all the unknown devices that are communicating with it, through wireless or VPN. An infected endpoint can contaminate the whole system.

Many of our customers use Cisco Meraki for router and switch security, which is very effective. In particular, I appreciate  Meraki’s system manager, cloud-based MDMs (Mobile Device Manager), which contributes to my ability to supervise and secure a customer’s network.

 

What is MDM?

MDM stands for Mobile Device Management. It enables us to centrally provision, monitor, and secure all endpoint devices associated with a network. If needed, we can restrict usage of a particular device, too. Everything is cloud-based, which means that business computer assets can be managed wherever they have to travel. You can locate and track any portable devices, like laptops and mobile phones, anywhere in the world. It enforces encryption. The network manager has visibility of all devices connecting to the network, which is so important for keeping everyone safe in an environment that is constantly changing.

Practical Features:

MDM has a lot of useful attributes that I really appreciate and can come in handy. Here are my top reasons for recommending it:

Location tracking:
If a mobile device gets lost, MDM can be able to locate the device’s last known location.
Remote management: You can install and/or remove apps, and push firmware updates.
Remote deletion: In the event of a mobile phone being stolen, all data from the phone can be completely wiped. This way, no data can fall into the wrong hands.
Application Control: You can set what installed applications you want the end user to utilize.
Automatic Backups: You can run remote backups of the phone and its settings so that in the event of replacing it for the end user, the phone can be completely restored.

MDM is, all-around, a useful tool for network security. When a problem comes up, we are able to easily identify what is the problem, contain it, and know how to fix it.

Hybrid VDI - Total Economic Impact of VMWare End User Computing

0 Comments