Retrieved from https://studentshare.org/information-technology/1492552-mobile-communication
https://studentshare.org/information-technology/1492552-mobile-communication.
Mobile Networks Recently, there has been a growing consumerization of IT and the bring-your-own-device is gaining momentum. Smart phones and tablets have speedily become the most personal computing devices to access and store personal and business information on the same device. The face of computing is increasingly changing, which is generating fear among IT managers changed with availing productivity tools while sustaining control of sensitive data. As companies develop their mobility policies, attention should be paid to maintaining a tight grip on the data contained in the device or any connectivity profiles (both VPN or Wi-Fi), which avail access to corporate networks to ensure that they are completely secure irrespective of whether the tablet is lost.
Mobile device management requires that the systems differentiate between enterprise and owner’s data. Candidate mobile device management platforms should support Android and iOS with management links to RIM’s. The adopted platforms can normalize controls irrespective of the platform used, and ensure that changes are fed on central directory. Communication 1 What does the future hold for LTE-Advanced ready network? The adoption of LTE-Advanced ready network plays a big role in aiding mobile companies add capacity, and depth to their new network while still retaining their 3G fall-back speeds available through HSPA 21 and 42.
There is a real promise of LTE-Advanced for both carriers and users, especially on the capability to offer reliable and consistent experience. For a majority of mobile networks, the introduction of 4G networks remains young in the planning stages (Jones, 2013a). The migration from wireline to wireless can play a critical role in helping mobile networks launch next-generation 4G LTE. What are the strengths of LTE-advanced? The adoption of LTE-advanced can play a critical role to improve the transmission speeds and spectral efficiency of 4G.
The spec can play a critical role to maximum download rates 3G bits and uploads of 1.5Gbit/s. LTE-advanced can avail a data speed increase over present LTE networks by deploying upgrades at the radio access network and handset (Jones, 2013b). This may include “carrier aggregation” techniques that merge two separate radio channels to attain higher data speed, especially on existing LTE devices. What is the function of Wi-Fi in delivering mobility? In adopting Wi-Fi, IT teams would be seeking to control costs and drive the most of mobility.
Wi-Fi can be a means of shifting some of the load and can motivate users to limit their cellular 3G/4G data use, and operators have introduced tiered plans in which pricing is usage-based on cellular connection. The nature of wireless centers on the fact there is an inherent lower capacity that wire, and it is wire line that is defining broadband expectations (Rysavy, 2011). 3G/4G network are much faster compared to the majority of WI-Fi networks, which may be slow due to enhanced use and congestion.
4G LTE networks can readily deliver 5-Mbps to 10Mbps downlink throughputs. What are the advantages presented by Wi-Fi to mobile network operators? WI-Fi represents a critical access technology and is mainly the fastest and most convenient means to connect online services within nomadic contexts utilizing mobile devices. Mobile network operators should involve in Wi-Fi with the aim of exploiting Wi-Fi economics and services advantages (Brown, 2013). “Carrier Wi-Fi” form some of the ways in which MNOs can gain control over Wi-Fi in general; however, its usage and implementation of the technology can be regarded as too diverse for that.
A number of reasons can be highlighted explaining why mobile operators should engage with and invest in Wi-Fi such as enhancing the customer experience, exploit Wi-Fi economics, and carrier Wi-Fi technology is maturing. How can mobile network operators prioritize mobile commerce plans? Mobile commerce has taken center stage and is important to the future of the organizations. Mobile commerce centers on transactions on mobile devices and represents a means for companies to engage with clients in right, individualized ways, incorporating incentives, loyalty, and location (Rysavy, 2013).
Some of the challenges that companies encounter in adopting m-concern include compliance concerns, perception that m-commerce is insecure, lack of security, inadequate connectivity speeds, confusion over business models related to money-flows, and immaturity of technology to integrate with present e-commerce and IT-back-end systems. Communication 2 What is the impact of consumerization of IT and the proliferation of mobile devices? The balance of power and control has been shifting away from the IT department and into the hands of the employee, which heralds significant consequences along with it.
At the same time, companies find themselves under mounting pressure to avail access to business data anywhere, anytime while guaranteeing that they sustain corporate security, compliance, and integrity. The balance of power and control is increasingly shifting from It department to employees as employees are highly empowered than before (Fixmo, 2013). Consequently, enterprise IT is losing administrative rights and the power to control operating systems, whether install security patches in which it is losing control over the end-point computing device.
What is the place of mobile device management in contemporary enterprise world? Increasingly, cyber criminals have been targeting mobile devices in an effort to exploit the weakest link within the corporate network to steal enterprise information via mobile workers’ unsecured endpoints. The schemes utilized by criminal entities targeting employee-owned mobile devices include key loggers, poisoned DNS, malware, compromised Wi-Fi hotspots, and malicious and privacy leaking apps (Moerschel, 2011).
The challenges of limiting risk around employee-owned mobile devices are intricate and real and mobile device management solutions have proved effective in enforcing device policies such as password control, remote wiping capabilities for lost/stolen phones, and VPN. What are the key factors that IT organizations should spotlight when evaluating MDM software? Employees require access to corporate data in order to function outside the office. However, the issue of data access brings up all manner of security questions (Marble, 2013).
Some of the pertinent factors to take into account for IT organizations evaluating MDM software include deployments; white list and blacklist filtering; App security screening; browser security; custom app stores; data wiping; encryption levels; inventory management; report; and, auto-provisioning of devices. What are the mobile device security related considerations that enterprises should take into account? Majority of IT departments are increasingly supporting a single device or mobile device platform.
The security advantages occasioned by mobile device platforms include supporting of a diverse mix of mobile devices since a broad range of tools, best practices, and policies, which can be utilized to enforce data security and compliance policy (Davis, 2012). Security professionals should be able to allow end users to select the devices, while complying with the security mandates of the business (George, 2013). Some of the mobile device security related considerations include passwords, iTunes/iCloud, camera, Apps, Wi-Fi, Geological services, and Email.
References Brown, G. (2013). Accelerating and scaling carrier grade Wi-Fi for mobile operators. Heavy Reading. Davis, M. A. (2012). Review and analysis” 3 MDM suites. InformationWeek Reports. Fixmo (2013). Enabling your business through mobile risk management: A strategic approach to mobile security, integrity and compliance. Sterling, VA: Fixmo. George, R. (2013). Securing the mobile user. InformationWeek Reports. Jones, D. (2013a). Meet the next 4G: LTE-Advanced. Light Reading Must Reads. Jones, D. (2013b).
A compendium of our best recent coverage. Light Reading Must Reads. Marble (2013). Nine critical threats against mobile workers. Sunnyvale, CA: Marble Secueity, Inc. Moerschel, G. (2011). Mobile Device management. InformationWeek Reports. Rysavy, P. (2011). Convergence of 3G/4G and Wi-Fi. InformationWeek reports. Rysavy, P. (2013). 2013 Mobile commerce survey. InformationWeek Reports.
Read More