by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : February 2014
6 MOBILITY to applications, data and networks, MDM allows administrators to configure access based on assignment roles and integrate authentication and authorization with enterprise directory services. Additionally, administrators can restrict application usage by creating blacklists, whitelists and application compliance policies --- all managed through an MDM or MAM solution. Depending on the organization's needs, administrators can filter what users are able to download from public apps stores and disable access to applications that are deemed unnecessary or security risks. MDM consoles provide complete visibility into which users download which applications and whether they comply with the latest version. e software also can generate app inventory and usage reports. • Remote management access: e IT team requires remote management access to user devices so it can monitor usage; ensure compliance; push out anti-virus patches, content and software updates; and take action if a device is stolen, lost or compromised by breach attempts. Some users may not be comfortable conceding this level of control to the IT department, which is why it should be addressed as part of the BYOD terms-of-use agreement. • Device security management: is MDM function is as much about protecting against devices as it is about protecting the devices themselves. Whether the organization or a user owns a device, proper security protocols are essential. During device enrollment, an MDM solution checks the type of device, platform and operating system version against allowable parameters, as well as against a list of blacklisted or unknown devices based on serial numbers or unique International Mobile Equipment Identity (IMEI) numbers. MDM further ensures that users are contractually onboard with BYOD policies by requiring them to accept the established terms-of-use agreement before enrolling the device and allowing access to network assets. MDM products allow IT administrators to impose and enforce restrictions on specific device features, applications and website access. Lost and stolen devices or login attempts that exceed set thresholds can trigger the system to lock or wipe the device. Solutions also include GPS functionality to locate and track a missing device. BYOD Takes Center Stage, MDM Prevents Overexposure e simplest strategy for managing and securing BYOD programs is to rely on MDM products, as they are designed to handle a full range of mobile platforms, including Android and Windows. Centralized solutions are integral to allowing BYOD usage (whether for worker, student or guest access) because they include capabilities for managing security policies and profiles, offer administrators real-time visibility into all activity and device information, ensure that application downloads meet security criteria, control what data is shared, and allow remote locking and device data wipe. Beyond MDM, comprehensive BYOD program management requires MAM and MCM solutions, which can be deployed on-premises or through the cloud. Given the complexities involved with managing the numerous aspects of BYOD programs, many organizations choose to not only deploy MDM and other mobility management solutions via the cloud, but also outsource management of their entire mobility program to cloud service providers. Managed service providers handle the entire device lifecycle, as well as all administrative, security and support functions for BYOD and enterprise mobility programs. Another key feature of a centralized mobile management solution is mobile expense management (MEM), which is designed to simplify what has proven to be a complicated facet of the BYOD movement. Organizations tend to oversimplify the cost benefits of BYOD programs, thinking they'll pass the costs of purchasing devices on to users, and perhaps subsidize users' work-related expenses. Although it can be an appealing proposition to have workers buy their own devices, deal with tech support by contacting providers themselves and charge the organization only for work-oriented expenses, asking them to manage these details can actually hamper productivity rather than improve it. Specifically, workers can end up spending a good deal of time filling out expense reports to get reimbursed for work they've handled on their own device, which in turn increases the workload of accounts payable departments. Productivity gains become productivity losses. Organizationally managed mobile programs, conversely, allow IT purchasers to centralize procurement and negotiate group rates for mobile devices, apps and telecommunications services. IT teams can better control security, manage device support, gain visibility into staffers' "WITH THE PROPER SAFEGUARDS AND TIERS OF SUPPORT IN PLACE, BYOD STANDS TO PLAY A LEADING ROLE IN PUBLIC SECTOR MOBILITY PLANS GOING FORWARD. "