2. Increasing IT Security by solving problems on mobile devices with an MDM:
Another reason to introduce an MDM to increase the level of IT security is that technical problems can be directly solved via MDM in some cases. Operating errors can be solved with the help of remote support functions.
2.1 Report and Avoidance of errors:
MobiVisor MDM, as a holistic MDM, has a debug log feature.
This means that the admin can request a log of the last activities of the device via the MDM. If an error has occurred, the cause can be discovered.
If the admin cannot solve the error directly, it is possible to report the bug to the MDM provider. In this way, errors can be corrected without having to reset the device each time.
The centrally controlled setup of mobile devices with all apps and policies also prevents bugs from creeping in right from the start.
2.2 Simplifying operation through KIOSK mode:
Devices running in KIOSK mode are characterized by a reduced user interface. That is, there are only a few predefined apps that can be used on the phone. As a rule, the system settings cannot be accessed by the user and thus cannot be changed. This also means that no settings can be made that could paralyze the device or prevent the basic setup.
Another advantage of the KIOSK mode is that it acts as a user interface above the actual user interface of the mobile device. All changes that are made are therefore only made on the KIOSK interface, but not in the device itself. If the KIOSK mode is removed, any incorrect settings would also disappear.
A clear specification of how devices must be operated generally increases IT security. The less the user has to decide and set up himself, the better the implementation of the company's internal security guidelines.
3. IT security and risk management with the help of MDM:
When mobile devices are used, they are exposed to many risks.
For example, mobile devices can be stolen more easily, can be lost or attempts are made to root them in order to circumvent security restrictions.
Public WLAN networks are also a risk factor, because you can never check how secure they are. If the mobile devices are also allowed to be used for private purposes, there is quickly a risk that private and professional data will be mixed.
Comprehensive risk management therefore increases IT security immensely.
With the help of an MDM, control mechanisms can be introduced for these threats to IT security:
3.1 Data recovery in case of loss or theft:
Every mobile device should perform regular backups of the important data.
This is because if the mobile device is lost, it can then be locked and wiped via the MDM without also deleting all data from the user's account. This double data storage is more costly, but also essential if you want to guarantee secure and effective mobile working.
If a device is lost or stolen, one of the strengths of MDM also becomes apparent: namely, the clear assignment of users and devices. This means that the device in question can be taken out of service immediately. In this way, any attempt to gain access to corporate data can be prevented.
3.2 Preventing the removal of the MDM:
There is an additional feature in MobiVisor to report rooting or resetting the device as a security breach. This action can then not be performed and in addition a message is sent to the admin that an attempt has been made to remove MobiVisor MDM from the device.
3.3 Secure Internet connections and clean data separation:
It is always recommended, especially for companies with very sensitive data, to define which Internet connections are allowed to be used through the mobile devices.
The 'Whitelist WiFi connection' function is available for this purpose. This prevents the device from automatically dialing into open WLANs.
If mobile devices are also used privately, private use of the Internet cannot be configured for legal reasons, but by installing an extra work profile on the mobile device, you can at least make a clean distinction between work and private use.
In this way, the work profile can prevent unsafe Internet connections from being used. However, extensive training on data security is generally recommended for this type of device use.