Thank you for attending the May Business Tech Talks session Advice for Avoiding Mobile Device Mayhem, presented by IT Solutions. We hope this webinar provided you with new information and tools to secure your company’s mobile business environment.

In case you missed the session we discussed:

  • Mobile device security: problems and risks
  • Different levels of control – which level is right for your business?
  • How to leverage tools that you already have in place to secure your mobile environment
  • The future of mobile device management and how to prepare

If you’d like to re-watch the session or share it with a colleague or friend, we’ve included the recording and the Q&A from the live session below.

Q: You mentioned a few native iPhone features having basic mobile device management functionality. Do Android and other devices have similar features?

Android does not have any comparable tools to the iCloud at the moment.

Q: You briefly touched upon costs. Which MDM tool will get me the most bang for my buck?

This is a tough question to answer in general terms. There are so many tools beyond the ones I covered today and all of them offer different features. It really depends on your specific needs and which levels of protections makes sense for your business.

If you are a small business with a few users or work out of your home office without HIPAA or SOX compliance, some of the basic tools can likely cover your needs.

If you are very concerned about your security and need to meet certain levels of compliance to ensure your data stays secure, then you’ll need to look into some of the pricier options.

Q: Can you monitor employees’ personal information such as photos, text messages, etc.? 

The different tools we discussed are not necessarily meant to monitor what your employees are doing on their personal devices. You can’t just gain free access into one of your employee’s phones.

However, there are a few tools out there that have remote access or assistance integrated, which is great for training users, etc., but even these tools require that the user request and then grant you access first.

All of these tools are designed to make sure your company data can be accessed safely and securely in your environment.

Q: Have you ever run into any privacy issues that resulted in HR or legal involvement?

It’s certainly a fear that big brother is watching, but I don’t think that these tools are in jeopardy of violating anyone’s trust in that way. I’m personally not aware of any situation that resulted in HR’s involvement.

If you have additional questions about the content covered or would like to discuss your specific mobile device management needs, please email us at webinar@businesstechtalks.com.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Set your Twitter account name in your settings to use the TwitterBar Section.