Story image

UEM solutions may be the key to mobile security

10 Sep 2018

Microsoft has experienced a meteoric rise in the Gartner magic quadrant for mobile security.  

Gartner has renamed this category to UEM which reflects the rate of change in mobility and the rapid evolution from ‘Mobile Device Management’ to ‘Enterprise Mobility Management’ and now to ‘Unified Endpoint Management’.  

Techday has been following this category very closely since 2011 and the recent jump by Microsoft is probably the largest shift we’ve had ever seen for any vendor on the quadrant.

Many of you have predicted this and some have already embraced the Microsoft mobility strategy. Microsoft’s late arrival at the party has allowed them to come well prepared and where others may be getting tired, Microsoft is ready for an all-nighter.

The reason I have been, and continue to be, bullish is the multi-layered approach Microsoft has taken to mobile security.  If you simply compare MDM features across a number of vendors, Microsoft will not stand out.  But compare the entire stack of considerations that make a secure environment and it is game, set and match for Microsoft. 

Find out more by clicking here

Here is a summary of the secure capability available in the EM+S suite of services:

  • Identity – Active Directory account with 2FA, self-service password reset and Single Sign-On.
  • Geo-fence – the ability to restrict the opening of an app to a specific location.
  • WiFi connection – the ability to restrict the opening of an app to a specific WiFi network.
  • Device profile – the ability to restrict the provisioning of an app to a device that is secure and managed.
  • App protection policies – the ability to restrict app functionality such as save-as, open-in, copy/paste and taking screenshots.
  • Advanced threat protection – the ability to automatically detect and react to malicious activity and hacking attempts.
  • Azure information protection – the ability to automatically apply encryption and additional security to sensitive content such as social security numbers.

As a stack, these technologies mean that you can secure a mobile deployment like never before.  Let’s take the example of an app for a hospital nurse. Using the EM+S service, they can deploy a secure app to a secure device, leverage the user’s AD credentials, permit the app to open only when the user is in the geo-fence of the hospital campus and connected to the hospital corporate WiFi (not public WiFi) and even then they can prevent screenshots and copy/paste actions in the app.

Find out more by clicking here

ABS and Google Cloud partner to demonstrate the feasibility of AI-enabled corrosion detection
The project successfully demonstrated the accuracy of AI in detecting and assessing structural anomalies commonly found during visual inspection.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
IDC: APeJ blockchain spending to grow over 80%
Blockchain spending is forecast to grow by 83.9% year over year in 2019, and 77.5% by 2022.
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
Why an IT resilient strategy needs to be in the modern CIO’s toolkit
"Having an IT resilience strategy in place allows an organisation to smoothly adjust to change."
Intel announces “most powerful mobile processors ever”
Improvements in performance, responsiveness and Wi-Fi connectivity will be rolling out for gamers and creators alike.
Software AG launches new cloud-based IT portfolio management tool
“Alfabet FastLane’s out-of-the-box approach absolutely addresses the needs of smaller IT teams."
Slack's 2019 feature roadmap unveiled
Including shared channels across organisations, workflow automation, greater email and calendar integration, and streamlined search.