StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile Device Management - Essay Example

Cite this document
Summary
The paper "Mobile Device Management" discusses that mobile device management is the most advanced technology being used these days. It’s not only modern and advanced, but also secure, remote, easy to configure and easy to upgrade and accept new changes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Mobile Device Management
Read Text Preview

Extract of sample "Mobile Device Management"

Running head: Mobile Device Management Mobile Device Management [Click here and type [Click here and type your s Abstract Mobile device management is one of the important and main tools/protocols of data communication. This branch has driven from data communication and utilizes the technology to send information or data signals from one place to another remotely. Mobile device management is the technology that not only encourages wide broadband of data transfer but also enhances the speed and mobility of the devices being attached to the network. This technology has improved a lot and has room for improvement and advancement more than the normal enterprise LAN, and much secure. It ensures safe mobility of the mobile devices of the enterprise network and allows hundreds of devices to be attached and configured with numerous remote users and remote network destinations. Mobile device management has the capacity to remotely upgrade itself by changing a bit of its system's settings; it ensures security, data transfer, user friendliness and discourages sensitive information theft, fabrication or any other illegal act of company's policy. CONTENTS Abstract 2 Abstract 2 Mobile Device Management 4 Reference 13 Reference 13 Mobile Device Management The most useful and advanced invention of the century is Computer and Information Technology. This technology is something that advances everyday and never becomes idle. Since its invention, computers have helped mankind to do their work with more flexibility, easiness, efficiency and time saving. The two main fastest growing aspects of Computers are Data Communications and Networking. Data communication is used for transferring information whereas networking is the medium through which the information could be transferred. These days, the electronic medium has grown with the new technology and the work pace has fastened its speed to cover time efficiency by lessening down the work load manually (Hossein, 2000, p#159). Data communications: The information needs a medium to travel from one place to another. Data communication helps in sending the data signals or information to travel from one point (usually called source) to another (known as destination) via analog or digital signals using electronic or light pulses. The modern age use binary signals instead of analog, the binary signals are used universally and known to every system. The binary signals are also known as digital signals, which is easy and flexible for the system to understand and process. Data is transferred through Data transmission and data switching techniques. The data can be sent via coaxial cables, optical fibers, telephone lines, modem, radio, and others. Group of data bytes are usually send to the receiver by the sender in shape of data packets to ensure secure and compact information. Data communication looks after the while process of how the information is being transferred from the sender to the receiver. This technique is of very importance since it holds the root value for the whole cycle. Data communication can be listed further into numerous techniques and holds control of uncountable devices. Such a technique is known as Mobile Device Management. Mobile device management: Mobile device management is a technique driven from data communications. It basically is the set of tools through which distribution of applications, configuration settings and data can be made easy for mobile devices such as mobile phones. As the time passes and technology grows, the enterprise and communications are going mobile. It helps individuals, companies, and even employees to access their work virtually from anywhere in the world without handling the connectivity manually or additional plug-ons. Mobile device management enables to perform security support, policy management, inventory, backup and device locking system and let the other users to choose their own devices. It not only provides efficient productivity, but also enhances flexibility and saves cost. Mobile device management is very much comparable to the processing and speeding tools that are present in fixed working machines, such as laptops and desktop computers. Mobile devices have seen a vast variety of functionality and modernization and have become highly sophisticated. They can provide management and security features just like the laptops and computer systems provide while connected to LAN or enterprise network. In short, mobile device management provides extended management capabilities and easy to use self-service functionality that strengthens security level and reduces risks associated with applications by reducing the total costs. It simplifies over the air management of mobile devices without assigning any customer agents. A self-manageable portal can be assigned to the users who can register themselves, administer their password settings, and register problems they are facing. A web-based console or system which is used to combines all the management tasks to give one large and compact solution; these tasks comprises of asset inventory, security, management tasks, configuration settings, policy agreement and reporting. The mobile device management is highly scalable and valuable (Stephen, 2007). Security aspect of mobile device management: Security can be the most important and of course the first thing that should be kept in mind while managing and working on any mobile device. The more the security is provided, the more the sell of the product increases. The security starts with the software and hardware inventory but later has been covered by security policy implementation, privacy policy enforcement and application distribution. For example; the password requirement at the power-on is a feature that should be implemented whenever you start your device, but this feature is hardly used by any employee of the enterprise. To ensure a secure mobile device, this feature should be made compulsory and mandatory or the settings should be made to restart the device again and ask the power-on password. Features like this could be a bit time consuming but helps a lot. A well managed mobile device management strategy could not only be the key to a successful mobile device deployment but could be the success of the whole IT mobile services deployment company providing such services. It is like saving the latest wireless, mobile technology, systems, devices, computing, networks, IT infrastructure and strategies in one mobile system and making it as the most useful source available as compared to the normal PC or laptop (Stephen, 2007). Mobile device management is one of the best opportunities not only for the operators but also for the enterprises in order to minimize costs, boost customer loyalty and enhance annual revenue. It has extended beyond the idea and thought of mobile technology advancement (Drake, 2006). A simple mobile solution can advance itself to such extend that it can support hundreds of users and devices with numerous operating systems and networks. Enterprises using mobile device management: Organizations usually go for a solution which provides wide range of security competencies and device management that could support the mobile device being used by their employees and teams. They prefer such solution over a specific technology. Mobile device management could be used as the answer to their requirements. Mobile device management is the suite or collective package which provides the data management applications, policies and services which are required and used in the corporate LAN by the workers and extended to their mobile devices. Mobile device management has the capability to upgrade, extend and change according to the changing demands of the enterprise (Craig, 2007). Key elements of strategic mobile device management: There are some mandatory key elements that help in making a strategic mobile device management. A checklist of such key capabilities is mentioned as follows (Craig, 2007): The first thing that would be required is a corporate security policy and acceptable-se policy. It helps in knowing about the enterprise resources which the users should use or not use and about the information which is critical to use. An asset management system should be included and attached to the mobile devices. It helps in knowing what type systems and software are being used by who and helps in tracking record of the sage history of the people working. The next step to take care of is the configuration management. It includes the type of applications and software that should be set on the mobile device. This helps in solving the problems remotely and saving costs. Then come synchronization and backup. Synchronization includes contacts, calendar, emails and files; and can be executed over LAN, wireless, USB, Bluetooth or a precise computer. The backup of the mobile device is also a mandatory activity to be carried out. Central management console is used to administer the configuration of virus scans, virus definition, firewall and other drivers. After that, remote access capabilities are defined that includes accessibility of LAN and allowance of control of spectacular machines on your concern. Finally, but not the least is monitory and usage reports of services. Risks involved in mobile device management: Technology is something that gets renew and updated widely and is improving day by day. As the technology grows and advances, so does the challenges t minimize the risks involved. The risks involved in mobile device management are numerous and are totally technology based. They can be seen as under (Craig, 2007): Theft, mishandling or loss of mobile device. Exposure or attrition of sensitive data to insecure sources or to the unauthorized person. Agents/helpers on the helpdesks having less information, intelligence and knowledge to provide to the customer. Lack in security to handle devices. Global workforce for mobile device management: (Drake, 2006) The worldwide mobile workforce has increased to immeasurable height. Organizations and enterprises are focusing on mobile device management and their workforce is utilizing this technology like anything. The mobile workers are making use of it and giving useful results for the company's business in terms of revenue, performance, productivity, efficiency, time management and customer satisfaction. The penetration level can be determined with the help of the following graph: Key requirements of mobile device management in an organization: (Sean, 2007) To enhance the overall functionality of the mobile device management, the following requirements would be needed: Asset management: It enables tracking of software and hardware devices and upgrades them accordingly. Software distribution: Involves transfer of an application or operating protocol from one place to user's location. It includes upgrading, updating, installing, packaging and distribution of applications. Mobile security: One of the most important and sensitive aspects in the mobile device management. Includes data encryption, data security, password security, device lockdown, authentication process and device wipe. Enhancement in mobile functionality: It covers the upgrade process and extension of the present old system by accepting the new changes in it and keeping updated. Challenges while implementing mobile device management system in marketplace: Mobile device management is not only good from the mobility aspects but it also holds control of all the devices mobilized in the organization and takes care of the networks and communications wireless. But it faces some key challenges while implementing the mobile device management system in an enterprise which are high lightened as under: At times, employees and management teams of organizations are unaware of the importance of mobile device management system. They perceive it as of no value for their performance or efficiency, and thus, create hurdles while implementing the solution. Another fact that is being misunderstood by the organizations is that they think that the present old LAN network management system would do the existing job well and will keep up the performance pace up to its mark. But they are unaware that their efficiency level and time management factor can be increased positively by implementing the mobile device management system in the enterprise. Mobile device management system is a cost efficient and growth prospective system. While deploying, it should be kept in mind that this system can extend its wings and space to deploy more space than before, can upgrade its existing status and modernize itself remotely. Usually it has been considered that mobile device management system would need a boosting replacement like the other LAN or memory systems that are not compatible to upgrade themselves according to the upcoming modern technology advancements. Organizations who recently go through implementation of a mobile system think that implementing a mobile device management feature would be the same and costly like the previous one. Mobile device management is not an additional cost on the present system. It enhances security features and reduces risks of system collapse. It is believed by some organizations and top management that mobile device management system is only applicable to a specific industry, whereas it is not true. This system and its applications are for everyone and applicable to all industries and organizations having mobile systems implemented in their companies. Conclusion: As explained, mobile device management is the modern technique which is adopted highly these days by enterprises and organizations. This technique enables the employees and teams of the company to mobilize their devices via using the remote network that enables them to distribute, share, upgrade, and secure their data and information via mobile devices. Mobile device management is the most advanced technology being used these days. It's not only modern and advance, but also is secure, remote, easy to configure and easy to upgrade and accept new changes. Now, when there are some benefits to accept this technology then sure there are some risks and challenges to implement the technology in some organization; but at the end, it ends up in enterprise performance appraisal and growth. Reference Bidgoli, Hossein, (2000), Handbook of Business Data Communications: A Managerial Perspective, Academic Press, p#159. Wellman, Stephen, (2007), IT Still Grappling With Mobile Device Management, Information Week, Posted on: Sep 18, 2007 03:54 PM. Mathias, Craig, (2007), Mobile device management -- Practical techniques, Mobile Computing. Drake, Stephen D., (2006), Demonstrating the Business Value of Mobile Device Management in the Enterprise, ComputerWorld, available online at: http://www.computerworld.com/pdfs/nokia_idc_report_wp.pdf Ginevan, Sean, (2007), Analysis: Mobile E-Mail - Attack of the Drones, Network Computing, Available online at: http://www.networkcomputing.com/showArticle.jhtmlarticleID=202200396&queryText=mobile+device+management Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile Device Management Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Mobile Device Management Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/miscellaneous/1512660-mobile-device-management
(Mobile Device Management Essay Example | Topics and Well Written Essays - 2500 Words)
Mobile Device Management Essay Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/miscellaneous/1512660-mobile-device-management.
“Mobile Device Management Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/miscellaneous/1512660-mobile-device-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Device Management

Mobile Security Issues

hellip; Computing Capabilities 16 Internet Access 16 Bluetooth 16 mobile device security in the context of Business Organizations 17 BYOD Trend and Security Issues 19 Unknown third-party access via mobile apps 20 Difficult to track data 21 Challenging data management and segregation 21 Devices can be stolen 22 Recommendations 22 Improve Authentication Mechanisms 22 Install and Update firewall in mobile devices 23 Malware Risk Management 23.... This paper has also considered the concept of “bring your own device (BYOD)”, which is a latest emerging business trend....
26 Pages (6500 words) Research Proposal

Australian ICT Framework and Mobile Device Management

… Australian ICT Framework and Mobile Device Management Customer Inserts Name Customer Inserts Grade Course Customer Inserts Tutor's Name Date of Submission Australian Governments Enterprise ICT framework Information and computing technology policies and frameworks help in the consolidation and rationalization of information technology processes, which is achieved through increment in flexibility, decrement in cost, and enhancement of assets in Information and Communication Technology (ICT)....
9 Pages (2250 words) Essay

Mobile Communication 1 and 2

Mobile Device Management requires that the systems differentiate between enterprise and owner's data.... Candidate Mobile Device Management platforms should support Android and iOS with management links to RIM's.... What is the place of Mobile Device Management in contemporary enterprise world?... The challenges of limiting risk around employee-owned mobile devices are intricate and real and Mobile Device Management solutions have proved effective in enforcing device policies such as password control, remote wiping capabilities for lost/stolen phones, and VPN....
3 Pages (750 words) Essay

Email Security Issues

The problem with email security is that there are a number of issues that emerge as a result of poor management of emails.... Business information and data is stored in emails and archives, and it becomes extremely easy for an organization to retrieve vast… Emails form the central pillar of organizations, and it is evident that this technology will proceed to find utility as the world continues to embrace new technologies (Porter 34)....
2 Pages (500 words) Essay

Integrated system design for cloud enterprise network and a secure BYOD

Such policies are such as Mobile Device Management, application virtualization and containerization.... A cloud enterprise network allows employees to access files, applications and printers from any location and on any device.... Bring your own device (BYOD) to work.... The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own… mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their BYOD By + Definition of Key Words for BYOD mobile Technology Consumerization of IT as a trend has improved with the introduction of modern mobile devices....
2 Pages (500 words) Essay

Major Information Technology Trends

This means that there should be a Mobile Device Management that has clearly defined policies, scope, as well laid out software solutions.... Consequently, there has been advancement in information technological trends such as the growth of mobile money and the use of mobile devices, which have changed the nature of related work (Miller par.... This section will briefly explain two major trends from the two firmsBattles related to mobile DevicesAccording to Gartner, the arrival of Windows 8 made battles related to mobile devices as one of the top technological trend for the year 2012 and 2013....
3 Pages (750 words) Essay

Key Features of Cyber Security

Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile-based device to any information system by utilizing a particular or a combination of varied data transfer methods.... The author of this coursework "Key Features of Cyber Security" describes significant cybersecurity vulnerability and associated threats in mobile computing.... This paper outlines the policies and procedures that can manage the vulnerability and threats in mobile computing....
9 Pages (2250 words) Coursework

Integrating Mobile Device Management

… The paper "Using Samsung's KNOX and Its Capabilities in Integrating Mobile Device Management Solution " is a delightful example of a case study on information technology.... The paper "Using Samsung's KNOX and Its Capabilities in Integrating Mobile Device Management Solution " is a delightful example of a case study on information technology.... The report delves into the advantages of using KNOX and its capabilities in integrating Mobile Device Management Solution and specifically how the solution would make it possible for remote resources to be accessed securely....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us