If you need to deploy loss and theft protection on hundreds or thousands of mobile devices across your enterprise, you need to identify the platforms you want to support in your enterprise and then shortlist the vendors whose solutions you’d like to deploy.
Here are the specific steps you need to take to start planning your deployment:
Determine the types and platforms used in the enterprise.
Find out what types of devices and platforms you need to support across all your users in the enterprise. Can you limit yourself to supporting only Apple’s iPhones and iPads, or will you need to support Android devices as well? And what about BlackBerry devices, or the users who’ve bought themselves the shiny new Windows Phone 7 devices?
Shortlist the solutions feasible to protect each type of platform.
From your analysis of all the individual platforms, make a list of the available vendors and solutions to provide loss and theft protection for all the platforms you need to support.
Platform to Support | Vendor #1 | Vendor #2 | Vendor #3 |
---|---|---|---|
Apple iOS | Juniper | MobileIron | |
Android | Lookout | Juniper | McAfee (WaveSecure) |
BlackBerry OS | Juniper | Lookout | McAfee (WaveSecure) |
Symbian | McAfee (WaveSecure) | Juniper | |
Windows Mobile | Juniper | McAfee (WaveSecure) |
Evaluate free trials of the shortlisted solutions.
After you’ve identified the leading solutions of loss and theft protection for the platforms you need, explore free trials. Many vendors offer limited free trial durations (such as for 30 or 60 days), which will help you evaluate those solutions.
In the rapidly changing world of smartphones and other portable devices, look for vendors whose solutions aren't restricted to just one or two mobile platforms. Because employees are likely to buy more than just one or two types of devices, it's ideal to roll out a solution that will address everyone’s needs and provide a comprehensive loss and theft solution.
dummies
Source:http://www.dummies.com/how-to/content/deploying-enterprisewide-loss-and-theft-mobile-dev.html
No comments:
Post a Comment