5 ways an enterprise mobility management (EMM) strategy manages data access and compliance

EMM promises greatly increased freedom and flexibility for employees, but there needs to be limitations. Help your customers to understand the role of EMM in setting rigorous access and compliance conditions for mobile workers.

The stakes for companies operating an enterprise mobility management (EMM) strategy are rising. Losing data or becoming a victim of fraud can involve both financial and reputational penalties.

Companies that fail to comply with the new, heavier regulations (particularly in the financial sector) can expect yet harsher penalties. The EU is developing a Cybercrime Directive and a new law on data protection, with fines of up to 2% of turnover. This will have ‘far reaching consequences for banks and financial services’.

Meanwhile, the average cost of data breaches for 383 companies participating in research by IBM and Ponemon Institute increased from $3.79 to $4 million within a single year.

While regulatory pressures increase, so does the pressure to adopt EMM strategies. This pressure also comes from your customer's employees who expect to enjoy the increased access, flexibility and efficiency of a matured mobility strategy.

Your customers will be looking to meet requirements on both ends. So here are five ways you can advise your customers on how to manage data access and compliance, as part of an EMM strategy.

1. A containerised approaching your own device (BYOD) and corporately owned, personally enabled working practices become commonplace.

Although there can be efficiency gains made from these policies, your customers will be predominantly concerned about the vulnerabilities this introduces to data and compliance. 75% of large organisations suffered staff related security breaches last year.

Simultaneously, employees are reluctant to allow employers to have control over their personal information, with 19% of employees stating concerns about privacy breaches.

Containerisation and app-wrapping capabilities offered by mobile device management (MDM) and mobile application management (MAM) solutions can provide a solution which satisfies both sides. Areas of devices can be specified for corporate use only with related authentication and access levels put in place, while app-wrapping prevents business apps from accessing any personal data on a device. This meets your customer’s requirements and protects the privacy of their individual end users.

2. Cloud computing

Look at cloud computing solutions as a means of providing widespread access to information for an enterprise. The uptake of cloud computing is increasing across the enterprise industry. Spending on public cloud Infrastructure as a Service hardware and software is forecast to reach $38B, growing to $173B in 2026.

Of course, not all of your customers will be convinced of its levels of security. Customers from public sector organisations may be particularly hesitant to move their systems across.

It can be a cost-effective and smart solution, providing automatic updates and backup, new software upgrades and unlimited storage capacity, but 41% of businesses admit migration to the cloud is an issue of concern in terms of data privacy and security risks.

Resellers will need to highlight that capabilities offered by MDM, MAM, and mobile content management (MCM) can negate these fears. Customers can be given more visibility and control through features such as:

  • Two step authentication.
  • Containerising devices.
  • App wrapping.
  • Remote wiping.

A holistic EMM strategy will give your customers complete control over how devices and apps are being accessed and used – all from one console.

3. Platform-neutrality

Consider a platform-neutral approach that will permit the maximum amount of data access from both existing and future devices, taking into account the spread of IoT and wearable technology.

“As equipment becomes outdated and reaches its end of supported life, it becomes less efficient, less productive and less secure. Outdated infrastructure does not support modern applications and innovation, and it does not have the resiliency needed to survive today’s threat environment.” – GovLoop

Smart EMM solutions that promote platform-neutrality will allow your customers to manage multiple devices, applications, platforms, and operating systems – now and in the future.

This will give your customer’s end users freedom to work in their preferred manner, while ensuring that the business is always prepared to support and manage these kinds of developments and equip their business to capitalise on new technology and become more creative and innovate as a result.

4. Better communication

Faster and fuller communications between employees and managers through smart EMM deployment mean that it can be easier to deal with compliance. Today, mobile devices record where everyone is at a given time, the activities that take place on their devices, and communications that are made alongside other data such as credit transfers.

A holistic EMM solution can give your customers full visibility over how devices, apps, and content are being accessed and edited. As part of communications, your customers can dictate the device areas, applications, and documents that are restricted to particular users, and why. Having such a wealth of information makes it simpler to provide compliance details and detect rogue activity on devices and applications.

5. Clear policies

On the other hand, if a company has not introduced clear policies on device use, access and work timing, there is the potential for misunderstanding or deliberate abuse. 73% of companies experienced an internal information security incident in the past year.

Resellers should work with their customers to clearly define roles, responsibilities, working practices, and disciplinary actions surrounding mobility management. This will set an understanding between your customer’s business and the end users on what is appropriate usage of devices, apps, and data throughout the enterprise. Policies also need to be set around who will own enterprise mobility throughout your customer’s businesses.

Conclusion

A holistic EMM strategy will help your customers to manage data access and compliance. This can be achieved through security features offered by MDM, MAM, and MCM solutions. Your customers will raise a variety of concerns about security but resellers can easily allay these.

It is essential, however, that your customers don’t just rely on the features provided by EMM solutions. Wider conversations, policies, and understandings need to be established throughout their businesses in order for an EMM strategy to really get off the ground. With resellers, customers, and employees all on the same page, data access and compliance can be a cinch.

Takeaways:

  • Think: Security, data access, and general compliance will be a huge concern for your customers. Explore how an EMM strategy can strengthen their security while maturing their approach to maturity.
  • Act: Demonstrate how implementing a holistic EMM solution will benefit your customer’s data access and compliance across all three critical areas - devices, apps, and content.
  • Lead: Successfully communicating with your customers around how to manage and secure data access and compliance will have knock-on effects. They will bring the wider organisation into the same discussion, making compliance more achievable.
  • Share: Create and share a data access roadmap, demonstrating what your customers need to do, the security features and mobility solutions they need to have in place, and the benefits for each. This tool can help your customers achieve success and become a story you can share.

The Trusted Advisor Blueprint: Why your customers should be considering an Enterprise Mobility Management (EMM) project now