46
Securely manage your data, devices, and applications Mobile Device Management With the compliments of Sybase ® iAnywhere ® Sybase iAnywhere Limited Edition

Secure and manage all your mobile devices · Secure and manage all your mobile devices Manage your mobile devices and applications Secure your mobile data Unleash your ... Part I:

  • Upload
    dangtu

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

Securely manage your data, devices, and applications

Mobile Device Management

ISBN: 978-0-470-69472-5Not for resale

� Find listings of all our books

� Choose from many different subject categories

� Browse our free articles

Secure and manage all your mobile devices

Manage your mobile devices and applications

Secure your mobile data

Unleash your mobile workforce’s potential

Explanations in plain

English

‘Get in, get out’

information

Icons and other

navigational aids

A dash of humour and fun

With the compliments of Sybase® iAnywhere®

In order to do their job, your fi eld personnel need the right information at the right time, on reliable devices. And, of course, security is vital. This minibook makes it easy for IT administrators to successfully mobilise their organisation – showing how to secure mobile data, manage devices and applications, and unleash the potential of the mobile workforce.

Choose the right mobile deployment solution

Sybase iAnywhere Limited Edition

By Mike Oliver, Sybase® iAnywhere®

Mobile DeviceManagement

FOR

DUMmIES‰

01_694725 ffirs.4.qxp 3/28/08 2:48 PM Page i

Mobile Device Management For Dummies®

Published byJohn Wiley & Sons, LtdThe AtriumSouthern GateChichesterWest SussexPO19 8SQEngland

E-mail (for orders and customer service enquires): [email protected]

Visit our Home Page on www.wiley.com

Copyright © 2008 by John Wiley & Sons Ltd, Chichester, West Sussex, England

All Rights Reserved. No part of this publication may be reproduced, stored in aretrieval system or transmitted in any form or by any means, electronic, mechani-cal, photocopying, recording, scanning or otherwise, except under the terms of theCopyright, Designs and Patents Act 1988 or under the terms of a licence issued bythe Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, W1T 4LP,UK, without the permission in writing of the Publisher. Requests to the Publisherfor permission should be addressed to the Permissions Department, John Wiley &Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, England,or emailed to [email protected], or faxed to (44) 1243 770620.

Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Manlogo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Funand Easy Way, Dummies.com and related trade dress are trademarks or registeredtrademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States andother countries, and may not be used without written permission. All other trade-marks are the property of their respective owners. Wiley Publishing, Inc., is notassociated with any product or vendor mentioned in this book.

Sybase, iAnywhere, and Afaria are trademarks of Sybase, Inc or its subsidiaries. ® indicates registration in the United States of America. All other company andproduct names mentioned may be trademarks of the respective companies withwhich they are associated.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER, THE AUTHOR, ANDANYONE ELSE INVOLVED IN PREPARING THIS WORK MAKE NO REPRESENTATIONS OR WAR-RANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THISWORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATIONWARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATEDOR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CON-TAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITHTHE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL,ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE ISREQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT.NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HERE-FROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK ASA CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEANTHAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATIONOR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERSSHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGEDOR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

Wiley also publishes its books in a variety of electronic formats. Some content thatappears in print may not be available in electronic books.

ISBN: 978-0-470-69472-5

Printed and bound in Great Britain by Page Bros, Norwich

10 9 8 7 6 5 4 3 2 1

01_694725 ffirs.4.qxp 3/28/08 2:48 PM Page ii

Contents at a GlanceIntroduction ............................................1

About This Book.............................................................1Foolish Assumptions .....................................................2How to Use This Book ...................................................2Icons Used in This Book................................................3Where to Go from Here..................................................3

Part I: Mobile Device Management: Why Bother? ...........................................5

Considering the Challenges of Mobility ......................6Considering Why Enterprises Need

Frontline Management ..............................................10Introducing Afaria, from Sybase iAnywhere ............11

Part II: Managing Your Mobile Deviceswithout Sweat or Tears ..........................13

Defining the Elements of a Great Management Solution ...............................................14

Finding the Solution with Afaria, from SybaseiAnywhere ..................................................................21

Part III: Under Lock and Key: Enforcing Security .................................23

Safe as Houses: Considering Your Requirements ....24Stating the Requirements of Your

Security Solution .......................................................25The Security Checklist ................................................28

02_694725 ftoc.4.qxp 3/28/08 2:48 PM Page iii

Part IV: Looking to the Future ................33Integrating Mobile Deployment Components .........33MAGnificent Multichannel Access Gateways ..........34Keeping Up with a Changing World ...........................35Avoiding Viruses Like the Plague...............................35

Part V: Top Ten Mobile Device Management Tips ..................................37

iv

02_694725 ftoc.4.qxp 3/28/08 2:48 PM Page iv

Introduction

Welcome to Mobile Device Management ForDummies, your guide to the management and

security of mobile computing equipment such aslaptops and handheld devices.

About This BookEvery day, more and more of your enterprise – alongwith its data and transactions – is moving to thefrontlines where you interact directly with yourcustomers. The frontlines present a key opportunity foryour business to gain a competitive advantage, byhaving the information and applications necessary totake decisive action when you need to. Technology isused at the frontlines in situations such as:

� A salesperson getting a customer to sign for thesamples just received – using a handheld device.

� A police officer with a laptop in her vehicle, ableto access a database of criminal information whileon patrol.

� A field service engineer referring to a laptop thatprovides information on specific parts needed –so that he can fix the customer’s problem the firsttime.

� A retail salesperson in a store checking stocklevels and processing transactions with ahandheld point-of-sale device.

03_694725 intro.qxp 3/28/08 2:48 PM Page 1

� A health worker having up-to-date patientinformation – whether beside the bed in hospitalor visiting the patient in her home.

This book gives you the lowdown on enterprise mobiledevice management and how Afaria®, the marketleading solution, can help you.

Foolish AssumptionsIn writing this book, we’ve made some assumptionsabout you. We assume that:

� You’re in business and enjoy the benefits of beingable to stay connected and informed while you’reon the move.

� You’re an IT manager who needs to keep on top ofthe multiple devices out and about in the field.

How to Use This BookMobile Device Management For Dummies is divided intofive concise and information-packed parts:

� Part I: Mobile Device Management: Why Bother?We explore the reasons to go mobile, the challengesyou’ll face, and the need for effective management.

� Part II: Managing Your Mobile Devices withoutSweat or Tears. We introduce the SybaseiAnywhere solutions, focusing on management.

� Part III: Under Lock and Key: Enforcing Security.We explain why securing your mobile data isabsolutely vital.

2

03_694725 intro.qxp 3/28/08 2:48 PM Page 2

� Part IV: Looking to the Future. Some crystal-ball gazing into the technologies you need toprepare for.

� Part V: Top Ten Mobile Device Management Tips.A small but perfectly formed chapter of tips forboth the mobile user and systems administrator.

You can dip in and out of this book as you like, or readit from cover to cover – it shouldn’t take you long!

Icons Used in This BookTo make it even easier to navigate to the most usefulinformation, these icons highlight key text:

The target draws your attention to time- ormoney-saving advice.

The knotted string highlights importantinformation to bear in mind.

The Dummies man indicates real-lifeanecdotes to illustrate a point.

Where to Go from HereAs with all For Dummies books, you don’t have to readthis one from cover to cover if you don’t want to. Usethe headings to guide you to the information you need.If you require any more information, you can contact usat [email protected].

3

03_694725 intro.qxp 3/28/08 2:48 PM Page 3

4

03_694725 intro.qxp 3/28/08 2:48 PM Page 4

Part I

Mobile Device Management:Why Bother?

In This Part� Considering security, visibility, and control

� Addressing the challenges of mobile device management

Did you know that up to 70 per cent of enterprisedata exists in various frontline settings, from

laptops to handheld devices, to shop and remote officeenvironments? That’s quite a statistic!

Your mobile staff might be employed for a variety of skills – to treat patients, dig up roads, repairmalfunctioning equipment, or sell a product. They’rerarely IT savvy and certainly not security experts. Yet more than 75 per cent of enterprises leaveresponsibility for security in the hands of the user –literally.

This part explores the challenges that mobility bringsand why you need management and security toaddress these challenges.

04_694725 ch01.qxp 3/28/08 2:48 PM Page 5

Considering the Challenges of MobilityMobility brings numerous opportunities – but alsochallenges. Table 1-1 compares the advantages ofnetworked computers with the challenges of mobiledevices that you need to overcome.

Table 1-1 Comparing Networked Computers with Mobile Devices

Networked Computers Mobile DevicesUnlimited bandwidth Bandwidth is limited

Guaranteed, reliable connectivity Intermittent, unreliableconnectivity

Local support for users No local technical support

IT can easily get to systems IT may never see devices

The same platforms used A variety of devices and platforms

Physical building security Easily lost or stolen

The following sections consider other challenges youneed to overcome when employing mobile devices.

Security Mobile management and security are totally inter-dependent. An unsupported, unmanaged ‘secure’system is invariably vulnerable the moment it leaves itscradle!

6

04_694725 ch01.qxp 3/28/08 2:48 PM Page 6

Mobile security is the need to control user access andprotect your data on the device and storage, in transit,and if lost or stolen.

Without the appropriate security, mobile devices areextremely vulnerable to security gaps. As a result, therisk of intrusion is high and security controls areinconsistent at best and often unenforceable. Whetherit’s hackers, viruses, corrupted data, or lost or stolendevices, there’s plenty to be concerned about.

Additionally, regulations regarding data privacy andencryption are becoming stricter and can even result infines for noncompliance. IT and security experts mustmanage and protect sensitive information and enforcecompliance centrally, rather than leaving the burden ofsecurity to the mobile device end-user.

Security will always be an issue – and the riskis even greater at the frontlines, on mobiledevices.

User adoptionWe all do whatever makes it easier for us to do ourjobs. Your mobile workers are no different. Over theyears, your office-based systems will have been honedby adopting best practices, and you’ll face a challengein asking your staff to abandon what they know and arecomfortable with.

Introducing new systems for frontline workers alwayscarries a risk that unless they see the benefits forthemselves and ‘buy in’ to the systems, users willrevert to their previous ways of working.

7

04_694725 ch01.qxp 3/28/08 2:48 PM Page 7

You need to ensure that electronic applications areintuitive and easier to use than the paper systems theyreplace. Ensure devices won’t fail just when yourworkers need them most.

Engage your mobile workers early, train andlisten to them, and they’ll make thedeployment a success!

Central visibility for ITCentral IT needs to see activity levels and usermethodology in order to anticipate issues andcontinuously improve the system.

Being able to see what’s actually going on at thefrontlines is critical to success. Your IT folk need toknow what activities are happening, and why, in orderto make better decisions.

If your workers aren’t utilising the systems you’vedeployed in the way you expected, you need to knowwhy.

ControlRather than trying to accommodate disparate systemsand processes, you need to drive the project centrallyto keep control.

You want to have mobile deployments linked foreffective data sharing so your frontline workers havethe information they need, when they need it, and sothat the information they gather is automaticallyprocessed to everyone who requires it.

8

04_694725 ch01.qxp 3/28/08 2:48 PM Page 8

Each disparate system brings its own challenges. Youmight have a variety of devices with different userneeds, connecting over significantly varying bandwidth,and they’re often beyond direct, onsite IT support.

Having a management solution that gives youcontrol over multiple devices and platforms,multiple user groups, and multiple processesis critical.

9

Food for thoughtIf you’re not convinced about the benefits of mobile devicemanagement, here are some stats to chew over:

� Industry analysts rate ‘mobile workforce enablement’ and‘security’ among the top enterprise IT priorities.

� It’s estimated that over 300,000 mobile devices are lost orstolen in the US. In the UK, it’s been reported that over 100devices a month are lost at Heathrow Airport alone.

� Effectively mobilising existing paper-based systems almostalways delivers significant business benefits. Numerousorganisations have achieved improved conversion ofprospects into active customers – by as much as 15 per cent.

� Effective device management can also bring communica-tions costs under control, sometimes delivering as muchas 60 per cent savings.

04_694725 ch01.qxp 3/28/08 2:48 PM Page 9

Business processes need to be consistently applied,and – as requirements change – executive leadershipneeds to be able to consistently drive changes toprocesses, actions, and behaviours.

Considering Why EnterprisesNeed Frontline ManagementYou may have already started venturing down themobility path and have deployed devices and anapplication for a team within your organisation.However, without effective management, devicereliability varies, applications aren’t supported as wellas those in the office, communication costs fluctuate,and security threats are significantly increased.

Effective mobile device management gives you securecontrol over your mobile data, devices, and applications,while giving your frontline workers the freedom toperform the job they were hired for, not struggle withtechnology.

Mobile workers are imperative to anorganisation’s success. Laptops and handhelddevices that support workers at the frontlinesare proliferating throughout corporations. Witha mobile workforce comes the widespreaddistribution of sensitive, proprietary, andsometimes downright top-secret data outsidethe secure walls of HQ. It’s critical for thesuccess of a mobile deployment to putmeasures in place to control and protectmobile assets. By implementing a solution that

10

04_694725 ch01.qxp 3/28/08 2:48 PM Page 10

proactively manages and secures mobile data,devices, and applications, mobile projects canimprove efficiency, customer service, and –ultimately – profitability.

The need for mobile systems management is growing –fast!

Introducing Afaria, from Sybase iAnywhere Afaria helps organisations succeed by delivering theright data to your mobile workers in the right place, atthe right time. It gives IT the broadest cross-platformcontrol and gives mobile workers the freedom to dotheir jobs rather than battle with baffling technology.

Afaria supports mobile workers, wherever they are, by:

� Maximising customer-facing time by minimisingconnection time, and delivering the rightinformation at the right time, on a dependabledevice.

� Supporting the mobile workers’ devices andapplications as if they were in the office.

Afaria supports enterprise IT by:

� Delivering control over all mobile devices, data,and applications from a single console interface.

� Keeping the security responsibility away fromyour end-users and within your control.

� Automating business processes.

11

04_694725 ch01.qxp 3/28/08 2:48 PM Page 11

Sybase iAnywhere has the market-leading productsthat deliver the functionality enterprises demand.Afaria has been the acknowledged market-leadingmobile device management (MDM) solution ever sincethe market’s been measured! And, as Afaria is part ofthe Information Anywhere Suite, Sybase iAnywhere canhelp you easily add on email, collaboration, or extendother applications as your mobility needs grow. InParts II and III we look at how Afaria securely managesdevices, data, and applications at the frontlines ofbusinesses.

12

04_694725 ch01.qxp 3/28/08 2:48 PM Page 12

Part II

Managing Your MobileDevices without Sweat

or Tears

In This Part� Thinking about what makes a great MDM solution

� Seeing how Afaria fits the bill

Maintaining the reliability and security of data anddevices at the frontlines can be very challenging.

These environments are diverse, complex, and oftenbeyond direct, onsite IT control. IT must be able toproactively manage all the devices, applications, data,and communications critical to the success of mobileworkers.

Organisations need to take a centralised approach tomanagement and security, providing IT with the controland visibility they need, while empowering mobileworkers to be successful with the information andapplications they need to do their jobs.

This part explains exactly what to look for in a mobiledevice management solution.

05_694725 ch02.qxp 3/28/08 2:49 PM Page 13

Defining the Elements of aGreat Management SolutionIt’s time to think carefully about the components of areally effective management solution. This sectionexplores the elements you need – that Afaria provides.

Naturally, you need mobile data and device security,but this subject is so important that Part III isdedicated to it.

Cross-platform device supportA good mobile device management solution supports a wide variety of client types – such as Symbian,Blackberry, Windows Mobile, Palm, and Windows XP –from a single web-based console. Your initialdeployment may just be for a team of engineers allusing the same tablet PCs, but you also need to plan for the future deployment of executive PDAs andsmartphones, maybe some older Palm devices in thewarehouse, or the sales team’s laptops. Plan now forevery platform you have in your enterprise today – andfor the new platforms continually emerging!

Configuration managementCentral control of mobile devices enablesadministrators to maintain a wide range of softwareand hardware settings including device identification,network settings, connection profiles, regional settings,and alerts. The settings are continually checked againstcentrally defined configurations and reset whenevernecessary.

14

05_694725 ch02.qxp 3/28/08 2:49 PM Page 14

Device monitoringEffective mobile device management enables the user towork offline, instead of being constantly reliant on aconnection to HQ. A high-quality device managementsolution reacts to changes in the state of a device –monitoring memory, files, folders, and registry settingsfor changes – and can trigger processes such as backingup a device when the battery level drops or launching aparticular application when a user signs on.

Monitoring also tracks application installationand usage policies through logging andreporting capabilities and can track whenconfidential files on mobile devices are writtento external cards or sent to other devices.

15

Protecting the insurersA market-leading insurance provider needed to protect sen-sitive customer financial and medical information residing onthe computers owned by 3,500 independent agents. SybaseiAnywhere’s laptop hard disk encryption, software distribution,device management, and stolen device lockdown dramaticallyimproved the ability to implement, monitor, and enforce strin-gent data security policies. The company’s reputation as anindustry leader in information security was enhanced and cus-tomer service improved by having the most up-to-date infor-mation on agents’ laptops.

05_694725 ch02.qxp 3/28/08 2:49 PM Page 15

License controlA valuable component of a mobile device managementsolution is tracking how software licenses are deployedand used. Automatically generated reports includeinformation about the last time an application wasaccessed.

Software distributionApplications can be electronically distributed, installed,and maintained – and all without the end-users’knowledge or involvement. Central administrationcontrols software installations, including versionmanagement, rollback, and criteria checking.

Inventory and asset controlAdministrators can perform comprehensive inventoryscans of hardware and software, automaticallyreceiving alerts of changes. A prime example is helpdesk personnel quickly capturing the state of a deviceto hasten the fixing of any problems.

Remote controlLaptop or handheld device systems are remotelycontrolled to diagnose and correct faults, enablingmobile workers to focus on their jobs, not their ITsystems.

Connection managementA strong MDM solution uses an intelligent architecturedesign that optimises the ability to make the appropriatedecisions about which tools to use when managing afrontline deployment. Additionally, connectionmanagement functions are fully deployable over-the-air,

16

05_694725 ch02.qxp 3/28/08 2:49 PM Page 16

eliminating the need for remote devices to be manuallyconfigured by IT.

Scheduling and prioritisationComprehensive scheduling enables work to becompleted at the most efficient times, andprioritisation of different tasks ensures quickcompletion of the most important activities. Systemadministrators control the content, timing, parameters,and method of communication.

Bandwidth optimisationComprehensive bandwidth management supportsapplications across all network types. On-the-fly datacompression, restarting connections at the point ofinterruption, file segmentation, and file-level and byte-level differencing minimise data volume for both largeand small transfers.

17

Getting the medical database fit and wellA leading medical database management organisation neededa solution to better manage data retransmitted by businessservices. With Sybase iAnywhere technology, its staff canupdate software and remotely diagnose laptop computers out in the field, eliminating the time-consuming method ofphysically shipping computers back to headquarters to beupdated or repaired. This significantly reduces time spent onback-office tasks and improves productivity.

05_694725 ch02.qxp 3/28/08 2:49 PM Page 17

Dynamic Bandwidth Throttling releases bandwidth toother applications when activity levels increase andthen reclaims it when they grow idle. Combining theability to dynamically react to throughput conditions,dynamically change throttling schemes, and dynamicallyconfigure and monitor these schemes provides you witha powerful means to reduce costs and minimise yourend-user pain. Clever stuff.

Software and inventory managementA leading mobile device management solution providesvisibility into frontline devices so IT know exactly whatdevices are deployed, where they’re located, and what software is installed. This provides IT with theability to better manage and control future softwaredeployments.

18

Protecting corporate securityWith more than 25,000 mobile workers, a leading global finan-cial services company wanted to enforce corporate securityand perform inventory control on thousands of newly deployedhandheld devices. It turned to Sybase iAnywhere technologyto secure information when devices are lost or stolen, provideproactive technical support by contacting users with solutionsto potential problems, and increase productivity becauseemployees are always connected. A spokesperson said: ‘Evenwhen a device was out of coverage, the Sybase iAnywheresoftware gave us the audit trail to ensure that the device waspassword protected.’

05_694725 ch02.qxp 3/28/08 2:49 PM Page 18

Application supportSignificant management capabilities can be added tothird-party or custom applications such as initialdeployment, updating, and continual over-the-airmaintenance. This functionality can even be fullyintegrated into your application via published APIs.

Document and content distributionA good mobile device management solution goesbeyond device management and gives IT the ability tocontrol applications and data too. Document files aresecurely delivered to frontline workers using a forcedor subscription model. Document owners have controlover content and can easily add, delete, and update

19

Speeding up fast foodA fast food chain of 1,300 restaurants needed to improve itsremote PC management capabilities, specifically sending andreceiving large files over the course of several transmissions,with the ability to re-start a file transmission without the entirefile having to be re-sent. It wanted specific stores to connectat specified times, silent software installations, inventory monitoring, and security patches applied throughout its estate.Using Sybase iAnywhere software, the chain improved bi-directional communication – both scheduled and ad hoc – significantly improving patch management, and simplifying ITinfrastructure. Transmission of daily reports has been reducedfrom 45 minutes to seconds, leaving store operators now ableto focus more time on running their restaurants!

05_694725 ch02.qxp 3/28/08 2:49 PM Page 19

content so that out-of-date documents in the field areautomatically replaced.

File-based information can be updated from any sourceand format, including HTML, database files, documents,and other electronic content. Technologies such asbyte-level differencing, which means replacing or updating a segment of a file (rather than the entire file),can deliver significant savings.

Process automationImportant tasks can be personalised and automated tomake them faster and easier for the IT administratorand user.

Wizard-driven point-and-click scripting allows infinitelycustomisable activities on server or client systems,automating tasks and removing onerous responsibilityfrom mobile workers. These processes can be scheduledor initiated manually, or they can be triggered by themonitoring of a third-party application.

Scripting delivers numerous possibilities: file transfers,hard disk checks and changes, configuration changes,and even ‘IF/THEN’ logic processes for complextasking.

System management extensionsWithin the confines of HQ, systems management is arelatively routine task. However, this task becomescomplicated with remote devices because thesedevices aren’t always connected to the network. A top-notch mobile device management system simplifiesthese routine management tasks by enabling regularmonitoring of devices to ensure compliance withcorporate policies.

20

05_694725 ch02.qxp 3/28/08 2:49 PM Page 20

Support for Microsoft SMS and otherLAN systems management toolsA comprehensive MDM solution is Microsoft .Net-basedand you can integrate it with LAN-based systemsmanagement tools (such as Microsoft SMS) to expandthe range of devices that can be managed from theconsole. You can use it to manage all the latestWindows platforms, as well as extend management ofother existing mobile operating systems including RIM,Palm, Symbian, and Windows handheld devices.

Finding the Solution withAfaria, from Sybase iAnywhereYou know the challenges and requirements of a reallyeffective mobile device management solution, and thegreat news is that Afaria meets every one of theseunique challenges of frontline environments. Afariaprovides comprehensive management capabilities to

21

Saving time and moneyA large broadband communications company with over 3,500field service representatives increased mobile worker and ITproductivity, reduced repair time, and reaped about $500,000 inannual savings – much attributable to automated device man-agement and application updates through Sybase iAnywheretechnology.

05_694725 ch02.qxp 3/28/08 2:49 PM Page 21

proactively manage and secure all the devices, applications, data, and communications critical tofrontline success, regardless of the bandwidth youhave available.

Afaria is an enterprise-grade, highly scalable solutionwith a central web-based console that enables IT tocontrol a host of key functions from a standardbrowser. And as Afaria is part of the InformationAnywhere Suite, you can easily add other keyfunctionality as your mobility needs evolve.

With Afaria’s ability to tie into enterprise directories,these functions provide everything necessary toextend your organisation’s management and securitycapabilities to any device, in any location.

22

Counting the savingsA leading provider of cleaning services found that manuallymoving large business-critical IT files to remote devices wascostly. It deployed Sybase iAnywhere mobile device manage-ment technology to manage its mobile devices and the flow ofdata. Staff time spent updating software decreased by 93 percent, travel reduced by 80 per cent, and shipping costsdropped by 100 per cent!

05_694725 ch02.qxp 3/28/08 2:49 PM Page 22

Part III

Under Lock and Key: Enforcing Security

In This Part� Thinking about your security needs

� Reading case studies

Laptops, handheld devices, and other mobiledevices are, by their very nature, easy to lose and

rarely within the grasp of your IT department. They’reusually loaded with sensitive customer information,the risk of intrusion is high, and security controls areoften inconsistent or non-existent. Mobile devicesrepresent one of the most challenging battlegrounds in your campaign against data loss and theft.

You employ your mobile workers for a variety of skills –to sell, fix, treat things, and so on. They’re not alwayscomfortable with IT and certainly not security experts.Yet, more than 75 per cent of enterprises leaveresponsibility for security in the hands of the user.

This part delves into the security issues and, moreimportantly, the solutions you need to consider.

06_694725 ch03.qxp 3/28/08 2:49 PM Page 23

Safe as Houses: ConsideringYour RequirementsWhen thinking about security, remember that securityis three-pronged and includes:

� Availability: Systems work promptly and serviceisn’t denied to authorised users.

� Integrity: Data isn’t changed in an unauthorisedmanner and the system itself isn’t manipulated.

� Confidentiality: Information isn’t disclosed tounauthorised individuals during storage,processing, or in transit.

Consider the relevance of the following list whendeveloping the policies for your organisation:

� Protection for small, easily lost devices carryingsensitive information, rarely under the directcontrol of IT tech support.

� Centralised control from a single console over allyour devices and user groups – whatever thedevice type, platform, or location.

� Security policies that meet legislative regulations.

� Reliable user authentication to control access tothe device and subsequently your corporate datastore.

� Protection for the data during transit and whenit’s stored on the device – whatever the platformor device type.

24

06_694725 ch03.qxp 3/28/08 2:49 PM Page 24

� The ability to protect the device even if you can’tcommunicate with it, utilising data fading or ‘kill-pill’ functionality.

� Future-proof solutions for new platforms andemerging threats.

Stating the Requirements ofYour Security SolutionAn effective mobile security solution, like Afaria,combines security and systems managementfunctionality from a single console. IT can transparentlymanage security requirements centrally, whilesupporting the application and device as if the mobileworker were attached to the office LAN. All necessarytasks can occur during a single connection.

Seek a security solution that delivers the followingfunctionality.

Password protectionPassword protection is the first step toward securingdata on mobile devices. You need a solution that offersthe ability to centrally define, control, and enforce end-user password policies.

It’s handy for central IT to be able to remotelyretrieve the password if your mobile workerforgets it. But if it’s an unauthorised attack,you need power-on password enforcement,requiring a user to enter a password each timethe device is turned on. If your pre-determinedthreshold of failed attempts is breached,

25

06_694725 ch03.qxp 3/28/08 2:49 PM Page 25

device lock-down policies automatically resetthe device or delete specified or encrypteddata.

On-device data encryption Data on devices and removable storage must beencrypted and decrypted with minimal userinconvenience. In the case of a lost or stolen device,data is protected through strong encryption and otherdevice disabling policies. Through the managementconsole, you can select what data to encrypt and when.You can also encrypt removable storage media, such ascompact flash cards and SD cards. Full-disk encryptionprotects the hard drives of laptops and tablet PCs,where the entire hard disk is encrypted, not just the

26

May the force be strong! A police force needed a single solution that would send up-to-date information wirelessly through the network to laptops fitted within its patrol cars. It chose Sybase iAnywherebecause it had so many features above and beyond what otherproviders offered: document management, hardware man-agement, software management, and a script-writing feature.The wireless solution automatically starts working every timea patrol car enters the coverage area – updating informationand software in 30 to 60 seconds, marking and restarting theupdate if the car leaves the coverage area before the down-load is complete. HQ is able to send out large files to the carsincluding wanted posters, missing persons information, crimestatistics – and is able to update those files automatically.

06_694725 ch03.qxp 3/28/08 2:49 PM Page 26

user data. This is a more secure approach and doesn’trequire the user to make judgements about what filesto encrypt.

Data-fadingData-fading is the capability for an IT administrator toautomatically lock, wipe, or reset a device that hasn’tcommunicated with the corporate email or managementserver after a predetermined number of days, in case adevice is lost or stolen. Similar protection can beinitiated by sending a kill-pill to the device: a message‘pinged’ to the device by the system administrator thatimmediately initiates data deletion or device reset.

Over-the-air data encryption Over-the-air encryption ensures data is protectedbetween the device and data centre. This also helpsensure that you comply with any enforced security legislation.

27

Following the five-point plan to securityRemember the five key elements of enterprise mobile security:

� Set and centrally enforce your policies

� Authenticate the user

� Protect the data during transit and when it’s stored on thedevice

� Secure your data if the device is lost or stolen

� Don’t rely on your mobile workers for security!

06_694725 ch03.qxp 3/28/08 2:49 PM Page 27

Patch management Patches are automatically downloaded and deployedappropriately on an individual or group basis. Usuallydetailed logs and reports are kept to show the currentpatch levels and the protection levels employed.

The Security Checklist Consider the following security measures in this handychecklist when you’re planning a mobile securitydeployment:

� Secure the device:

• Enforce strong power-on password protectionthat users can’t bypass or turn off.

28

Helping an electricity provider shine brighterAn electricity provider needed a solution to manage its field-force asset inspection team. Previously, this field collectionwas completed in different regions using either paper orknowledge-based systems. Going mobile, utilising SybaseiAnywhere technology, enables distribution of work orders toinspectors in the field to capture and synchronise the assetinformation back to head office, automates previously manualprocesses, and provides secure data transfer between headoffice and field inspectors. More importantly, it increases flex-ibility for the field inspection team, giving them GPS locationinformation for each asset and a full maintenance history – attheir fingertips!

06_694725 ch03.qxp 3/28/08 2:49 PM Page 28

• Remotely lock devices that are lost or stolen.

• Proactively wipe data from devices when youneed to.

• Reprovision devices in the field (automaticallyconfiguring devices for new usage, or building anew device with the configuration, applications,data, and security policies of a lost device itreplaces).

• Encrypt sensitive data stored on mobile devices.

• Manage, distribute, and install security patchestransparently via an administrator.

• Regularly back up key data from mobiledevices to the corporate network.

• Inform users about the importance of and themeans of protecting their information.

� Guard against malicious code:

• Distribute and install antivirus updates and software patches immediately and transparently.

• Prepare to tackle future threats – such as theincrease in viruses that target handhelddevices.

• Monitor and enforce system and applicationsettings each time a device connects to the LAN, keeping track of who’s accessed information.

• Block unprotected devices from accessingcorporate systems such as email.

29

06_694725 ch03.qxp 3/28/08 2:49 PM Page 29

• Retrieve client-scan log files to analyse who’saccessing data and applications on thefrontlines.

� Secure connections to corporate networks:

• Authenticate users and devices during eachconnection to the corporate network.

• Encrypt data to ensure safe transfer over thenetwork.

• Automate an inspection that verifiescompliance with security standards forantivirus software, patch levels, and personalfirewall settings before allowing a connection.

� Block network-based intrusion:

• Distribute, install, and maintain personalfirewalls transparently via an administrator.

• Enforce software settings.

• Monitor intrusion attempts at everyconnection from the frontlines and blockunauthorised access or unprotected devices.

• Use exception reporting and alerts via anadministrator to identify and correct networkweak points to limit intrusion.

� Centralise control of policies and corporatedirectories:

• Implement centrally managed security policiescomplete with established written policies.

• Audit security policies and ensure that they’reenforced by consistent reporting.

30

06_694725 ch03.qxp 3/28/08 2:49 PM Page 30

31

The PDA prescriptionA leading hospital delivering care to nearly 700,000 patientsevery year deployed handheld devices to much of its medicalstaff. They selected Sybase iAnywhere technology to ensurethat the most accurate information and applications are avail-able to their users. The data transfer process is so easy andquick that the users can stay up-to-date all the time. Their ITdepartment uses the technology to know who has whichdevice, which software is licensed to each device, and howmuch memory remains. One of the great benefits of these features is that the IT department can keep track of inventoryand can diagnose and treat IT problems. By examining logs via a web browser, helpdesk personnel can proactively troubleshoot a variety of problems.

06_694725 ch03.qxp 3/28/08 2:49 PM Page 31

32

06_694725 ch03.qxp 3/28/08 2:49 PM Page 32

Part IV

Looking to the Future

In This Part� Seeking multiple components from a single vendor

� Guarding against handheld virus attacks

Especially in the ‘mobile’ space, technology changesfaster than you can deploy! In this part we peer

into the crystal ball at what you’re likely to need toconsider in the near future.

Integrating Mobile DeploymentComponents As mobility becomes adopted more strategically in the future, organisations will seek to have more components from a single vendor. Having integratedcomponents – such as management + security; security+ email; email + messaging; application + messaging +management – reduces the risk of technological conflicts, not to mention the challenge of working withmultiple contracts and multiple vendors when you justwant your system to work.

07_694725 ch04.qxp 3/28/08 2:49 PM Page 33

Afaria, from Sybase iAnywhere, is part of theInformation Anywhere Suite, a secure, scalable mobiledevice platform that addresses these converging ITrequirements. By combining mobile email,collaboration, device management, enterprise-to-edgesecurity, and back-office application extension, theInformation Anywhere Suite enables your organisationto empower employees to do their work anywhere, atany time, on any device.

MAGnificent MultichannelAccess Gateways Currently, mobile deployments consist of a mix ofmobile solutions from multiple vendors – each withseparate software stacks for data transport. This leadsto direct conflicts with network connections, as well asbattery drain, complexities with testing, higher supportcosts, and an inability to effectively secure or manageyour systems.

IT staff are moving towards combining the currentlyclashing data transport communications within a singleaccess gateway called a multichannel access gateway(MAG).

Make sure that your mobile management andsecurity solution is capable of communicatingwithin your multichannel access gateway.

34

07_694725 ch04.qxp 3/28/08 2:49 PM Page 34

Keeping Up with a Changing WorldNew devices and even new platforms constantly challenge corporate IT. As soon you try to standardiseon a device or platform, it’s out of date, or your staffdemand support for their own shiny gadgets!

The line between personal and work devices isbecoming increasingly indistinct. There’s a mix ofenterprise operating systems and devices, with nosingle clear winner. And suddenly an emerging class of consumer devices will make their way into theenterprise.

You need to select a vendor who’s committed tosupporting the entire mixed device needs of yourcompany – not just a sub-set.

Avoiding Viruses Like the PlagueViruses are predominantly the curse of the laptop anddesktop world, but handheld virus attacks arebecoming increasingly prevalent since the first PDAvirus was reported way back in 2004. As the devicesbecome more popular, expect threats to your businessto increase too! Choose a management and securitysolution that counters this risk.

35

07_694725 ch04.qxp 3/28/08 2:49 PM Page 35

36

Hotting things up for the fire brigadeOne of the largest fire brigades in Europe selected SybaseiAnywhere to provide its mobile systems management solu-tion to update and distribute risk information and buildingplans to over 150 fire appliances. The solution ensures all fireappliances are equipped with an up-to-date plan of all majorrisk buildings in their locality, to facilitate a fast and efficientemergency service, as well as to satisfy regulatory legisla-tion. Probably the most important feature of the deployment isthat it ensures data is standardised throughout the force sothat if an emergency is large enough for more than one sta-tion to be involved, attending appliances are working from thesame information.

07_694725 ch04.qxp 3/28/08 2:49 PM Page 36

Part V

Top Ten Mobile DeviceManagement Tips

This part is small but packs a punch! Here are ourtop tips for both the systems administrator and the

mobile worker.

For the corporate systems administrator:

� Centrally enforce security policies on mobiledevices. Don’t leave it up to the end-user to turnon password software, encrypt data, or keep anti-virus software up-to-date.

� Implement a back-up system to protect corporatedata. Don’t expect mobile workers to back uptheir own systems regularly. The back-up systemneeds to work even over slow dial-up connectionsand be completely unobtrusive to the user.

� Utilise software that enables remote configurationof all your mobile systems. You can then maintainbrowser and security settings centrally.

� Keep an up-to-date hardware and softwareinventory along with a back-up of all users’ data.Doing so helps you get the user up and runningfaster if the worst does happen.

08_694725 ch05.qxp 3/28/08 2:49 PM Page 37

� Provide your mobile workers with top levels ofsupport. Your mobile workers need that support –they’re on their own and they’re generatingrevenue for the business.

For the mobile worker:

� Push your IT people to provide an automaticback-up system for your data. This relieves youof the burden of remembering to back up yoursystem every day.

� Change your passwords regularly. Don’t use ones that others could easily guess such as yourspouse’s, child’s, or pet’s name.

� Be wary about where you browse on theInternet. Set your security settings to maximumwithin your web browser. Some unscrupulouswebsites could be spying on you and your data.

� Be careful about who you open emails from.Don’t open a message from someone whose nameyou don’t recognise, particularly if it has anattachment.

� Don’t abuse the system by loading software thatcould impact its use for your job. Remember thatthe system is a tool to help you work efficiently.

38

08_694725 ch05.qxp 3/28/08 2:49 PM Page 38

A Reference for the Rest of Us!TM

978-0-470-51648-5 978-0-470-51259-3

978-0-7645-7028-5 978-0-470-01838-5

978-0-470-51646-1

978-0-470-51501-3

978-0-470-17469-2 978-0-470-14927-0 978-0-470-17474-6

Available wherever books are sold

BUSINESS

SELF HELP

DIGITAL LIFESTYLE

09_694725 badvert01.qxp 3/28/08 2:49 PM Page 39

Manage. Secure. Unleash!

• Manage your devices and applications

• Secure your data

• Unleash your mobile potential!

Messaging • Management • Security • Application Enablement

When it comes to mobile device deployments you need to remember just three things:

www.iAnywhere.com

10_694725 badvert02.qxp 3/28/08 2:49 PM Page 40

Securely manage your data, devices, and applications

Mobile Device Management

ISBN: 978-0-470-69472-5Not for resale

� Find listings of all our books

� Choose from many different subject categories

� Browse our free articles

Secure and manage all your mobile devices

Manage your mobile devices and applications

Secure your mobile data

Unleash your mobile workforce’s potential

Explanations in plain

English

‘Get in, get out’

information

Icons and other

navigational aids

A dash of humour and fun

With the compliments of Sybase® iAnywhere®

In order to do their job, your fi eld personnel need the right information at the right time, on reliable devices. And, of course, security is vital. This minibook makes it easy for IT administrators to successfully mobilise their organisation – showing how to secure mobile data, manage devices and applications, and unleash the potential of the mobile workforce.

Choose the right mobile deployment solution

Sybase iAnywhere Limited Edition