Story image

UEM solutions may be the key to mobile security

10 Sep 18
Sponsored

Microsoft has experienced a meteoric rise in the Gartner magic quadrant for mobile security.  

Gartner has renamed this category to UEM which reflects the rate of change in mobility and the rapid evolution from ‘Mobile Device Management’ to ‘Enterprise Mobility Management’ and now to ‘Unified Endpoint Management’.  

Techday has been following this category very closely since 2011 and the recent jump by Microsoft is probably the largest shift we’ve had ever seen for any vendor on the quadrant.

Many of you have predicted this and some have already embraced the Microsoft mobility strategy. Microsoft’s late arrival at the party has allowed them to come well prepared and where others may be getting tired, Microsoft is ready for an all-nighter.

The reason I have been, and continue to be, bullish is the multi-layered approach Microsoft has taken to mobile security.  If you simply compare MDM features across a number of vendors, Microsoft will not stand out.  But compare the entire stack of considerations that make a secure environment and it is game, set and match for Microsoft. 

Find out more by clicking here

Here is a summary of the secure capability available in the EM+S suite of services:

  • Identity – Active Directory account with 2FA, self-service password reset and Single Sign-On.
  • Geo-fence – the ability to restrict the opening of an app to a specific location.
  • WiFi connection – the ability to restrict the opening of an app to a specific WiFi network.
  • Device profile – the ability to restrict the provisioning of an app to a device that is secure and managed.
  • App protection policies – the ability to restrict app functionality such as save-as, open-in, copy/paste and taking screenshots.
  • Advanced threat protection – the ability to automatically detect and react to malicious activity and hacking attempts.
  • Azure information protection – the ability to automatically apply encryption and additional security to sensitive content such as social security numbers.

As a stack, these technologies mean that you can secure a mobile deployment like never before.  Let’s take the example of an app for a hospital nurse. Using the EM+S service, they can deploy a secure app to a secure device, leverage the user’s AD credentials, permit the app to open only when the user is in the geo-fence of the hospital campus and connected to the hospital corporate WiFi (not public WiFi) and even then they can prevent screenshots and copy/paste actions in the app.

Find out more by clicking here

Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Police making progress into Cryptopia breach
New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.
NEC concludes wireless transport SDN proof of concept
"Operation and management of 5G networks are very complicated and require automation and closed-loop control with timely data refinement and quick action."
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Avaya introduces private cloud delivery of its UCaaS solution
Avaya is supposedly taking a flexible hybrid approach to the cloud with these new solutions.
Data growth the growing case for managed colocation
The relentless growth of data could see colocation take on a new importance, says Jon Lucas.