Mobile device management

from Wikipedia, the free encyclopedia

Mobile device management ( MDM ; German mobile device management ) is a term from information technology and stands for the centralized management of mobile devices such as smartphones , notebooks and laptops , PDAs or tablet computers by one or more administrators with the help of software and hardware . A further development of MDM solutions with components for Mobile Application Management (MAM), Mobile Content Management (MCM) and Identity and Access Management (IAM) for a wide range of mobile devices and platforms is called Enterprise Mobility Management. Management refers to the inventory of mobile devices in organizations, the software, data and policy distribution , as well as the protection of the data on these devices. Since these devices communicatewith internal company resourcesvia cellular networks and WLAN , problems of wireless management must also be solved ( air interface (OTA)).

implementation

Typical solutions include a server component ( client-server model ) that sends the management commands to the mobile devices and a client component that runs on the managed device and receives and implements the management commands. In some cases, a single provider provides both the client and the server , while in other cases the client and server come from different sources. Mobile device management has evolved over time.

Initially, you either had to connect to the handset or install a SIM card to make changes and updates. Scalability was a problem. One of the next steps was to allow a client-initiated update, similar to when a user requests a Windows update . The next step is the central remote management with commands that can be transmitted over the Internet. An administrator of the cellular network operator, a company IT data center or an OEM cell phone can update or configure any mobile device , group or groups of handsets via an administration console. This provides scalability benefits that are particularly useful when the fleet of managed devices is large. Device management software platforms ensure that end users benefit from plug-and-play data services for the device they are using.

Such a platform can automatically discover devices on the network and send them settings for immediate and ongoing use. The process is fully automated, saves the history of the devices in use and sends settings only to subscriber devices that have not been previously set, sometimes at speeds of up to 50 over-the-air settings, update files per second. This function of device management systems is based on the filtering of IMEI / IMSI pairs.

Problems and requirements

While laptops are still a typical mobile IT infrastructure of companies, many mobile devices are primarily designed as consumer devices. Accordingly, the operating systems have not been designed and developed for MDM. At the same time, the demand of users to be able to access company software and data with their own device is increasing . This practice, known as BYOD ( Bring Your Own Device ) or IT consumerization , is becoming increasingly widespread according to some sources, while it is decreasing according to other sources. According to Computerwoche , at the beginning of 2012 around 25% of the companies surveyed were using private devices with company applications. According to Forbes Magazine, IT managers estimate that approximately 40% of users access corporate content, while 70% of users claim they do. What is undisputed, however, is that this practice is increasingly posing a risk for many organizations. In one case it was even suggested that forfeited previous devices part of the reporting to the US Securities and Exchange Commission SEC should be.

On the one hand, the security needs of the organizations must be satisfied, for example a version of the operating system that meets the requirements must be used, the security measures of which have not been circumvented by " jailbreaking " or "rooting". After switching on, the devices must first be unlocked by entering a PIN. Data and software on these devices must be secured against loss ( backup ) so that they can be reloaded if necessary ( update over the air ). It must be possible to clean up stolen or lost devices ( remote lock and wipe ), access rights to central data must also be managed via the mobile devices ( policy & provisioning ) and the costs and use of the devices must be monitored ( logging & accounting ). In addition, problems relating to the arrival of new staff have to be solved, such as staff departures and the subsequent necessary deletion of company data and software on the devices (" corporate wipe "). Finally, private devices in particular must still be able to be used privately and, if necessary, there must be a separation between private and business use. This is now also necessary in order to meet the requirements of the EU GDPR. The IT departments must also observe the confidentiality of telecommunications , which prohibits them from accessing private data on the mobile device.

Market volume and development

The market for MDM software and services, estimates the consulting firm Forrester Research in 2011 to 3.9 billion US dollars and expected to grow to 6.6 billion by 2015. Significantly conservative, that is at least half a billion dollars estimates In contrast, Forbes Magazine reports the market for 2014. According to Forbes, this market is shared by around 80 companies and expects a market correction in the next few years, while at the same time it is predicted that it will mix with the market for traditional security software.

Individual evidence

  1. a b c d e Frank-Michael Schlede and Thomas Bär , Guide: Mobile Device Management - keeping the mobile device zoo under control ; Network Management from May 4, 2012
  2. Mobile Device Management - What You Need to Know | Virtual Solution . In: Virtual Solution . ( virtual-solution.com [accessed August 3, 2018]).
  3. Roland Bauch, Thomas Beer :: Networks - Basics . In: Basics . 7th edition. HERDT-Verlag für Bildungsmedien ,, 2004, ISBN 978-3-8237-1140-7 , p. (Page 9) .
  4. a b c Karin Quack , The Byod Hype ebbs ; Computer Week September 17th, 2012
  5. a b c d e Tom Kemp Mobile Device Management Hits Center Stage, but Concerns Remain , Forbes Magazine, February 15, 2012
  6. a b c d Ben Schwan , Smart or Safe? Heise November 26, 2010
  7. Company cell phone stolen - are company data secure? In: www.everphone.de. Retrieved March 5, 2019 .
  8. MDM and the new EU GDPR. Retrieved February 20, 2020 .
  9. Jürgen Seeger My device, your device - "Bring Your Own Device" without regrets ; Heise; Retrieved October 18, 2012
  10. Benjamin Gray and Christian Kane; Market Overview: Cloud-Hosted Mobile Device Management Solutions And Managed Services ; (Link no longer available), Forrester Research , January 3, 2012
  11. ^ John C. McCarthy, Michele Pelino et al. (August 2011) Mobile Management Takes A 180-Degree Turn , Forrester Research ; Retrieved October 18, 2012