How to work with– not against– employees with MDM

One of the biggest challenges IT faces with MDM is getting and keeping devices enrolled. As long as Apple and Google continue to cater their mobile OSes to the consumer market, IT will need to find ways to keep devices secure, and secure means under management. If the recent battle between FBI and Apple teaches us anything, it should serve as a warning to IT departments everywhere to make sure their devices are truly managed with some form of MDM.

The FBI’s 2016 Privacy Red Herring – Despite What You Read in the Media, Corporations Can Unlock the iPhones They Own

RedHerringI often find myself laughing in regards to the overreactions we make in today’s world, where every opinion can be so easily spread – especially if there is any type of political current. As of late though, my laughing has subsided and I find myself much more concerned. Unfortunately for the majority of us whose opinions’ fall in the middle of the extremes, our voices are typically too quiet and often drowned out.

2016: Looking ahead in Enterprise Mobility

Android(own)There will be Android “N” and an iPhone 7. Ok, now for some predictions. Certain things are expected in the mobile marketplace, but it’s the unexpected that can often be the most fun. Beyond speculating on what the “N” will be (and could it really be anything but “Nutella”?), there are several very big items that could reach critical mass in the coming year. I’m only going to predict a few, but invite you to share your predictions and your mobility wish lists with me.

• Mobile payment takes off. What it does after that is the fun part. With both leading platforms offering mobile payment on their latest generation devices, it will be interesting to see how adoption goes. Considering retailers (here in the USA, specifically) are already dealing with EMV chip-based payment in fits and starts, perhaps mobile payment is a welcomed alternative. Or maybe another headache.
• Mobile malware escalates. In 2015, we witnessed early, but newsworthy, breaches of the iOS platform. We’ve also seen how jailbroken devices can turn mobile users into what I call “unwitting accomplices to the forces of evil”. There are bad guys out there, and they are continuously looking for opportunities. Mobility, because of its very personal nature – BYOD and all, need to be protected, because users have widely varying degrees of understanding the risks.
• Tablets over-expand. In 2010 Steve Jobs proclaimed “the current crop of 7-inch tablets are going to be DOA”. A lot has changed over the past five years, but the iPad Pro and Mini? Tablet sales, in general, have been sluggish this year, and the things to watch will be a narrowing of sizes, and whether the push for convertible tablets, which Microsoft is driving with the Surface, changes the way we use these larger screen mobile devices.

We’ll all, undoubtedly, be tuned in to the fast-moving space that is enterprise mobility. It’s a market that continues to impress with its speed of change and the introduction of new technologies. At LANDESK, we’re excited to experience it alongside you, and look forward to helping you optimize its place within your business.

I’ll close with a “thank you” for choosing LANDESK as your partner for user-centered IT. We wish you all the best for a happy, healthy 2016!

Pound for Pound Strongest Leader in 2015 Gartner Client Management Tools Magic Quadrant

I spent roughly sixteen years practicing martial arts. I learned several styles that included self-defense, stand up fighting techniques, grappling, and how to throw an opponent. I also learned to use several weapons—yes, I do have nun-chuck skills. 🙂 Sometimes I like to watch Mixed Martial Arts (MMA) fights, but not because of the violence or blood. I’m really more of a pacifist. I prefer to watch the smaller guys compete in the octagon. They’re faster, more agile, land more strikes, and are far more strategic and technical in the way they fight than the heavy weight competitors. However, you won’t see a fight between a featherweight and a heavy weight in the MMA. It’s just not considered a fair fight.

Battle in the Magic Quadrant Octagon

What’s After IoT?

GettyImages_481415267The Internet of Things is set to become 2015’s proverbial dead horse in the media, after Big Data’s thorough enough “beating” in 2014. Previous to Big Data, we’ve had Cloud, SaaS, and gamification, among others. Each have had their place in business, some less important than others, but their time in the media spotlight has taken a chronological back seat to what is “next” in tech.

So what’s after IoT? I think to figure out what we all will be talking about for the next 12-18 months, we should consider what the Internet of Things means for the future. First, let’s get clear on a couple things: the Internet of Things has been happening for a long time. Connected mobile devices, creating and passing data, either actively or passively, is not new. We just haven’t been ready for the amount of data we would be compressing, nor did we have the infrastructure in place to manage the transfer of that data. Now that we do, the Internet of Things deserves a real shot. Gartner is predicting that the Internet of Things will include 26 billion connected devices by 2020, and Cisco forecasts $19 trillion in economic value over the next decade.

Wearables in the Enterprise: Wellness Programs

487692979Here at LANDESK, HR recently rolled out a new wellness program for US employees where gym memberships are reimbursed if we maintain a certain level of activity tracked via a wearable and synced to a wellness service. After reading up on the program, my thought was whether this is the first real introduction of wearables in the enterprise.

The old wellness program simply required employees to opt-in to get a gym membership. I am an avid runner and triathlete and use my gym membership regularly. The reality is that most people rarely use their gym memberships. This is great for gyms and people like me where usage expenses don’t get impacted by most of the paying members. For businesses, this is one benefit that perhaps need not be provided. Enter the wearable.

Biometric Authentication and Mobile


Passwords: everyone hates them, but they have become a necessary evil in our digital life. In the end, it’s all about protecting access to data and devices. Mobility presents opportunities and challenges for authentication. One of the biggest opportunities for better authentication on mobile devices is biometrics. Biometric authentication includes fingerprints, iris, voice, etc. and has long been seen as a replacement for passwords.

2015 Enterprise Mobility Predictions

454127893Sitting down back in January, if someone had told you some of the biggest mobility stories of 2014, would you have believed them? That’s the way it happens in an industry that moves as fast as the enterprise mobility market – disruption is an ongoing activity. There have been some that were anticipated stories: what would the iPhone 6 bring? Would the “L” be for “lollipop” or “licorice”? While others weren’t expected: malware hitting the iOS platform, Apple’s partnership with IBM, and the root causes of some high-profile data breaches. Between mergers, shifts in hype and security issues, this year has not had time for the ink to dry on one story before the next is leaping off the page!

You can take a look back at my predictions for 2014 if you enjoy the “year-in-review” experience. Fast moving markets produce significant, and often surprising dynamics all the time. With 2015 just a few short weeks away, here are some of the enterprise mobility predictions I expect we’ll witness in the coming year:

• Touch-ID solutions will proliferate. Apple introduced it with the iPhone 5s, and expanded its use in iOS 8. In 2015, expect Google (via Samsung) and Microsoft to bring similar technologies to market for authentication on Android and Windows Phone, respectively.
• UEM becomes a leading acronym. That’s right, take a whole bunch of acronyms you’ve been using for the last few years and mesh them together into a single, broader solution. For those not familiar, UEM, or Unified Endpoint Management, will become a big theme in 2015 as companies wrestle with multiple vendors and products to manage all the technology that enterprise users carry. Market insiders have been talking about it a lot in 2014, but in 2015, expect IT to start demanding tight integration among mobile, systems and security management.
• Workspaces no longer refer to cubicles. It has already started in 2014, but enterprise workspaces will become a widely discussed term in 2015, delivering on the promise of role-based access to corporate content that enables user across the organization to be more productive and connected to the tools they need in order to get their jobs done.

We’ll be watching for these trends, as well as the numerous surprises 2015 will have in-store for us in the New Year. What are your predictions for Enterprise Mobility in 2015? Email me: with your expectations, wishes and dreams. Or comment below.

Finally, all of us at LANDESK thank you for entrusting us to provide your IT Management solutions. We look forward to providing you with new and enhanced solution in 2015 that further our promise of user-oriented IT, and we wish you all the best for a happy, healthy 2015!

Why Wrap an App: An Explosive Argument

100882419I’ve spent some time working with customers in the hazardous locations market – where mobile devices are essentially sealed in a manner that prevents an electrical spark within a mobile device from causing a serious danger to the external environment within which these kinds of devices are used. Think of it in this way: Inside a mobile device, there are plenty of little electronic circuits that can discharge static electricity (a spark). If that spark were to be exposed to the air in a petrochemical refining facility, the consequences could be dire (and that’s an understatement). As a result, mobile devices used in these kinds of environments need to be sealed in such a way that the activities happening within the mobile device are sealed off from the outside world. Some call it “Intrinsic Safety” or “Hermetic Sealing”.

App-wrapping is essentially the mobility software equivalent of this safety measure. Companies need to protect their data that is accessed on the mobile device. Much of that data may be confidential, and if it were to be exposed to the public, it could potentially cause severe damage. Still, just as there are productivity benefits for workers to work in hazardous locations, there are similar advantages for allowing mobile users to have access to the content they need from their mobile devices. In both cases, sealing off the risk is the best kind of security, but the precautions have to be aligned with how the users get their work done.

Mobile security has some very obvious benefits. Below are a few specific to app-wrapping that warrant consideration:

• Provide for mobile security without compromising the user experience (as containerization had)
• Protect wrapped application data from being accessed by external (unwrapped) applications
• Unlike SDK-based app-wrapping, one-click wrapping makes for easier deployment
• IT can update security policies without having to re-deploy all the wrapped applications
• Wrap all kinds of Android apps (Enterprise and Google Play Store apps)

Mobile security requires the balance of data isolation and insulation against vulnerabilities. Any breach of that confidential data, and it’s bound to ignite a firestorm. Like those intrinsically safe devices I mentioned earlier, be sure your mobile data is wrapped to protect it from danger.

LetMobile: A Better Approach to Secure Mobile Email

481019307We are pleased to announce the launch of LetMobile Secure Mobile Gateway 2.6. With this launch, we are providing a unique approach to securing the most important business information on mobile devices: email. By using a secure mobile gateway, email, attachments, calendaring, notes, tasks and contacts can be protected without a significant loss in end-user experience.

The need for secure mobile email arises due to email and attachments including sensitive business, customer and employee information. Businesses run on email and to compromise that data is to comprise a business. Whether it is compliance, data loss prevention, protection from government and corporate espionage, email is a top target on mobile devices.

When LANDESK acquired LetMobile in May of this year, we obtained one of the most innovative approaches to secure mobile email to date. Historically, the standard approach to secure mobile email has been a separate app(s) where business email, calendaring and contacts would reside. There are often trade offs for security, but the trade off for the separate app approach is often a large usability gap between native email apps. In today’s BYOD, consumer-first world, such gaps result in frustrations and often users circumvented security controls.

LetMobile turned secure email (and calendar\contacts) on the side with their secure mobile gateway approach. Other mobile gateways have been used for access control and authentication and stop there. The LetMobile Secure Mobile Gateway is a bi-directional gateway that goes beyond access control and authentication to actually serve up content without actually storing the content on the mobile device. This means emails and attachments don’t reside on the device so a lost device is just lost hardware.

In addition to the innovative approach to delivering secure email, the LetMobile Secure Mobile Gateway goes a step further to deliver device profiling, real-time data loss prevention (DLP) and detailed auditing. Device profiling means access can be blocked dynamically based on location or compliance. DLP rules can protect extra sensitive content (credit card numbers, social security numbers, etc.) in emails or attachments from being accessed from a mobile device. Detailed auditing gives IT the ability to understand what’s happened on the mobile device with email in case of loss or theft.

This LetMobile Secure Mobile Gateway 2.6 release is the first release since being acquired by LANDESK and provides many key new capabilities. First we have localized LetMobile administration and end-user interfaces with 10 languages. LetMobile 2.6 also introduces streamlined enrollment for iOS and Samsung Android devices. Additional improvements include reporting, installation, device calibration, and forwarded email blocking.

LetMobile Secure Mobile Gateway can be used with any MDM, but for many customers it has been the only enterprise mobility management solution that organizations use on mobile devices. With a user-friendly and BYOD-friendly approach to secure email\calendaring\contacts, we believe the LetMobile Secure Mobile Gateway will be a critical solution for any organization.