No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
    • On-Demand Webinars: Earn CEUs
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
    • On-Demand Webinars: Earn CEUs
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Featured

Managing Security with a Mobile Workforce

by Diane Conde
September 8, 2017
in Featured, Leadership and Career
Managing Security with a Mobile Workforce

Using EMM to Support Remote Teams and Ensure Safety

Companies are becoming more open to the remote worker, seeing the benefits in increased employee productivity, efficiency, morale and engagement. However, along with these benefits to employer and employee come a new set of managerial challenges and security protocols, particularly in the use of mobile technology. Diane Conde, Senior Manager at Tangoe offers her perspective on how enterprises can support the remote worker and ensure the safety and security of all company devices and data through Enterprise Mobility Management (EMM).

Twenty years ago, more than 90 percent of the American workforce could be found in offices or facilities belonging to their employers. But according to a 2015 Gallup Poll, that number has fallen to 63 percent. With the convenience and accessibility of mobile technology today, it is easier than ever to work remotely.

More and more firms are open to the remote worker, seeing the benefits in increased employee productivity, efficiency, morale and engagement. However, along with these benefits to employer and employee come a new set of managerial challenges and security protocols, particularly in the usage of mobile technology.

Enterprise Mobility Management (EMM) is a growing field both within companies and in outsourced services. Firms dealing with a wide array of hardware and software providers, as well as mobile telecom carriers, often find themselves trying to manage a bewildering maze of contracts, costs, discounts, upgrades, replacements and more – which is why outsourcing some or all EMM functions is a fast-growing trend.

A real-life example: an energy retail company that sells its services through both direct and reseller channels. Trying to boost its sales productivity, the company initiated a large internal EMM program to put very specialized mobile productivity tools in the hands of every remote salesperson.

They wanted to deploy very secure iPads that had access to a privately developed enterprise communications tool with access to sales documentation and order forms, as well as a publically available mobile point-of-service tool to allow credit card purchases. They also needed a subset of these devices to be multi-share devices to be utilized by sales people working different shifts. Because all the devices were corporately owned, they wanted workers to be able to access only the software tools deployed to the devices through their EMM platform.

Realizing the complexity of the situation, the company decided to partner with an EMM outsourcing provider.

VMWare, MobileIron and Microsoft inTune all have technology available that allow conditional access to cloud-based services. These products are leading edge and as mobile application usage rises, we see the real benefit to corporations and end users alike, from both a security standpoint and an ease of use due to Single Sign-On (SSO) capabilities. In evaluating these tools for this client, the outsourcer recommended a simpler route to accomplish their goals in terms of technology, cost of licensing and implementation.

The EMM Managed Services team recommended leveraging a Device Enrollment Program (DEP) to enroll and supervise their iPads. The enrollment process was streamlined with a customized configuration of iPads that are supervised and locked down by default. DEP devices are also locked down so that only authorized corporate users can enroll the device. The EMM platform was configured to push a passcode policy to the devices to ensure that every device can be locked and that they are encrypted by default.

The outsourcer and client worked hand-in-hand to test, stage and deploy an approved set of business applications that were whitelisted and pushed to devices. Unauthorized applications were hidden from the devices entirely so that users could not access them. Blacklisted applications included Contacts, iMovie, Facetime, iTunesU, Pages, Numbers, Keynote and the iTunes application store. Restricting the device in this way closes the door to potential malware threats, key loggers or sniffers that would attempt to capture credit card data. Through the use of restrictions policies, the outsourcer recommended devices be locked down to prevent access to unauthorized features such as AirDrop, modifying accounts on the device, in-app purchases, iMessage and games. Users were further prevented from installing applications, and software updates are completely controlled through the EMM platform.

Where the client had the need to allow shift-based sales people to share devices, the outsourcer tested, staged and deployed an additional configuration called “Multi-user Secure Sign-In for iOS” to all of the devices in the identified group. This configuration pushes a web clip to the iPad that allows their users to sign in and out of the device while maintaining security and application postures approved for all sales teams.

At the end of the process, the client was able to leverage technology they already had in place to put very secure, uniform, application-specific mobile productivity tools in the hands of both their direct sales force and their channel resellers.


Tags: Cloud ComplianceTechnology
Previous Post

Protecting Your Corporate Culture

Next Post

The Halliburton FCPA Enforcement Action: Lessons Learned on Internal Controls Failures

Diane Conde

Diane Conde

Diane Conde is Senior Manager of the Enterprise Mobility Managed Service practice at Tangoe, where she leverages over 15 years’ experience in managed services and mobility. Diane and her team of engineers work with clients to leverage their EMM platforms, secure their mobile environments, and increase their employee’s mobile productivity.

Related Posts

theater curtain

Comms Surveillance: Everyone Plays a Role in Picking a Vendor

by Harriet Christie
August 29, 2023

Federal regulators’ attention on the use of mobile devices in the financial services industry has companies adopting new technology and...

perpetual motion bird

Continuous Compliance Keeps Organizations From Focusing on the Past

by Alev Viggio
August 21, 2023

What’s more useful to your organization: understanding your compliance posture today or where you stood six months ago? Drata’s Alev...

Medical professional enters information into electronic medical record

Navigating HIPAA Compliance in the Cloud: Is Google Workspace the Right Fit?

by Nick Harrahill
August 15, 2023

By 2025, an estimated 85% of enterprises will shift to a cloud-first mindset, while others will adopt a hybrid approach...

Google Cloud perspectives on security_f

Google Cloud Perspectives on Security for the Board

by Corporate Compliance Insights
July 24, 2023

How can boards of directors provide effective cloud oversight? Second Edition Perspectives on Security for the Board What's in this...

Next Post
Halliburton FCPA Enforcement by Tom Fox

The Halliburton FCPA Enforcement Action: Lessons Learned on Internal Controls Failures

Available SQ
New call-to-action

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment Sanctions SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2023 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
    • On-Demand Webinars: Earn CEUs
  • Subscribe

© 2023 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT