Enterprise Management of Mobile Devices: Monitoring - dummies

Enterprise Management of Mobile Devices: Monitoring

By Rich Campagna, Subbu Iyer, Ashwin Krishnan, Mark Bauhaus

Enterprise management of mobile devices includes the continual monitoring to ensure that the mobile device is in compliance with your enterprise policies at all times. This is different from application control and monitoring, which have more to do with user behavior and being able to control what the end user is trying to accomplish.

The primary objective of device monitoring is to validate device compliance to enterprise policies at all times.

Typically, an enterprise agent is installed in the provisioning process, and it’s your eyes and ears for every enterprise mobile device. This agent has some unique characteristics – it needs to consume very little CPU and battery power, and it needs to be as unobtrusive as possible until a violation is detected.

The CPU and power budget consumed by this agent is critical because your users are going to revolt if this agent causes their smartphones to become unresponsive or drain significantly. Therefore, any vendor that you choose needs to demonstrate a lean and mean profile that can perform the tasks unobtrusively.

And unobtrusively means that when the device discovers a known enterprise wireless access point and connects to it, the device monitoring agent monitors this connection to ensure that all communication thereafter stays encrypted.