MDM Importance and Challenges.
ANSWER
Your observation about Mobile Device Management (MDM) extending beyond just phones and tablets to include laptops is spot on. It’s essential for businesses and large organizations to have a robust MDM department to ensure the security and management of these devices. Citrix Endpoint Management and IBM’s MaaS360 are indeed excellent cloud-based solutions that offer flexibility and cost-effectiveness, making them attractive choices for companies.
The advantages of MDM, as you mentioned, are numerous. Remote monitoring, enforcing security settings, and the ability to wipe corporate data from lost or stolen devices are critical features that can help protect sensitive information and prevent data breaches.
The concept of a Bring Your Own Device (BYOD) policy is gaining popularity for many organizations, as it not only allows employees to use devices they are comfortable with but also can increase productivity. However, as you rightly pointed out, ensuring that employees adhere to security practices can be challenging, especially in situations involving disgruntled employees or those who leave the company. To mitigate these risks, organizations need to implement strong security policies, conduct regular training and awareness programs, and maintain strict access controls.
Your discussion provides a comprehensive overview of MDM and its importance in today’s workplace, and it’s clear that you’ve absorbed valuable insights from both the CEH book and your research. Well done!
QUESTION
Description
reply to discussion post below:
When I first saw Mobile Device Management (MDM), I thought it would only apply to phones and tablets, but now that I see laptops are included, I definitely see the need to have a strong MDM department within any business or large organization. Citrix Endpoint Management (formerly XenMobile as referenced in the CEH book) is cloud-based just like IBM’s MaaS360 management solution but also offers a pay as you use it fee so not only do you not have to buy additional servers or infrastructure, it will also not be a large up front cost as the IT team experiments with and initiates enforcement (Citrix). Using IBM’s or Citrix’s MDM solutions would allow the company to remotely monitor all mobile devices, enforce security settings and requirements on all devices, and if lost or stolen remotely wipe all corporate information to avoid data compromise.
I’ve personally seen a couple companies using a Bring Your Own Device (BYOD) policy to allow their remote workers to use their own laptops and phones/tablets to work while at home and when traveling to the office. From what I could tell it was extremely useful because, as stated in CEH and on Citrix’s website, the employees are more productive since they are already comfortable with their own devices and operating systems. To make this work, the employees had to complete training to follow good security practices and keep their corporate information separate from personal information, required VPN’s while teleworking, and allow their device to be remotely monitored in case of loss or compromise. The most difficult part to guard against would be a disgruntled employee or one that was recently fired because it would be difficult to guarantee that the rules were completely followed.
Citrix. (n.d.). Citrix Endpoint Management – Enterprise Mobility Management Solution. Retrieved June 17, 2019, from https://www.citrix.com/products/citrix-endpoint-management/
EC-Council. UMUC: Certified Ethical Hacker (CEH) Version 10 eBook w/ iLabs (Volumes 1 through 4). [eVantage]. Retrieved from https://evantage.gilmoreglobal.com/#/books/9781635…