Business Apps – Overview of Managed Android Devices

By: BlackBerry Elite, Ekke Gentz

If you’re developing mobile business apps sooner or later customers will request to debug, build and run on managed devices. This blog post is focused on Google for Work | Android (aka Android for Work) …

My examples are based on BlackBerry UEM 12.6 (formely known as BES 12)

You can try out UEM for 30 days (Cloud version) or 60 days (on-premises) for free.

Using a managed device is like working behind the firewall via VPN, but all is transparently managed by the EMM solution provider.

EMM Admin manages users, user groups, devices, policies and apps. Here you can download the policies for BlackBerry UEM. Get an overview of BlackBerry UEM here.

Developing a new app there are typically 3 stages:

  1. develop UI with MockUp data (no access to servers needed)
  2. test against test environment
  3. release for production environment

Source: Overview managed Android Devices

Share

10 ways to reduce insider BYOD threats

Employees benefit by using their own devices for work, but there can be security risks as well. Here are some ways to control or reduce these threats.

Device management used to be so simple for IT professionals. New hires would arrive and you would order a Blackberry (or possibly an iPhone or Android, though Blackberry’s mobile device management ecosystem was superb) for them, provision it, configure their account and apply the security settings they needed. Everything ran on one carrier which provided device support and replacements and the company footed the bill, so you could establish usage upon users with mutual agreement.

Then along came the BYOD (Bring Your Own Device) movement which brought massive cost savings, user flexibility and a better range of device choices. But it also made life tougher for IT pros in the way of greater support headaches and security concerns. Security requirements don’t change, regardless of who owns the device or what operating system it runs.

With this advice in mind, here are some tips to reduce insider BYOD threats:

  1. Know when to say no …
  2. Have a BYOD policy …
  3. Identify responsibilities up front …
  4. Consider segmented services or networks …
  5. Use Mobile Device Management …
  6. Mandate standard security settings …
  7. Mandate application/operating system updates …
  8. Educate users …
  9. Have a security incident plan …
  10. Use monitoring …

Source: 10 ways to reduce insider BYOD threats – TechRepublic

Share

Simply Mismatched: 3 Reasons Government Should Rethink Using Mobile Device Management For BYOD

Government agencies and their employees like BYOD because it gives employees mobile access to work email and documents, on their favorite devices, without having to allocate IT funds for hardware.

Mobile device management (MDM) solutions have been touted as the simplest, most cost-effective way to reduce security threats from BYOD phones. Yet many government IT pros who’ve deployed MDM regret what was supposed to be a cost-cutting measure once they realize all the tradeoffs they’re making, including in the area of security.

Here’s three reasons why BYOD and MDM simply don’t go well together in government. …

Source: Simply Mismatched: 3 Reasons Government Should Rethink Using Mobile Device Management For BYOD

Share

Watch Your Endpoints: How to Upgrade from Good Control to BlackBerry UEM – and Why You Should

Are you thinking about upgrading from Good Control to BlackBerry UEM but don’t know where to start? Look no further than our new guide to the benefits of our unified endpoint management platform! Whether you’re wondering about BlackBerry UEM’s enhanced capabilities for mobile device management (MDM) and app management-supported policies; looking for information about advanced policies, controls, and containment capabilities; or want to know what kinds of administration improvements are available, the Benefits of Upgrading from Good Control to BlackBerry UEM Reference Guide will help you find the answers that you’re looking for. …

For more information like this, read the Benefits of Upgrading from Good Control to BlackBerry UEM Reference Guide and also check out the BlackBerry UEM Pre-installation and Pre-upgrade Checklist.

Source: Watch Your Endpoints: How to Upgrade from Good Control to BlackBerry UEM – and Why You Should

Share

A Collective Response to Security

Today’s threat landscape in cyberspace is dynamic, and we need to be candid and coordinated to keep pace as mobile technology evolves at unprecedented rates. While rapidly changing technology ultimately gives us more power in the digital world, it also makes our systems more vulnerable as they rush to market; and as hackers develop more sophisticated tools to penetrate security measures designed to protect us.

No individual company or enterprise is fully equipped to navigate the perils of cyberspace anymore.  Our global digital infrastructure — the Internet — connects all entities including governments, businesses, and individuals, and leaves us exposed to our weakest links.  This integrated threat landscape has required governments and organizations to develop a nationally integrated response to address cybercrime – starting now. …

 

Source: A Collective Response to Security

Share