Managing Mobility Is a Major IT Challenge

Karen A. Frenkel Avatar

Updated on:

Managing Mobility Is a Major IT Challenge

Managing Mobility Is a Major IT ChallengeManaging Mobility Is a Major IT Challenge

From uncontrolled roaming costs to user negligence causing overages to data loss, managing mobility can be a major challenge for IT managers.

Document Policies and Communicate ThemDocument Policies and Communicate Them

Ensure that your organization has business rules that govern usage and that everyone is aware of them. Stay flexible so that mobility continues to enable employees. Review the rules often to make sure they have a true business purpose.

Monitor and Understand the User BaseMonitor and Understand the User Base

Know your employees, their usage patterns and potential areas of risk. This is essential to managing enterprise mobility. You can’t manage what you don’t understand.

Enforce Acceptable Use PolicyEnforce Acceptable Use Policy

Enforce your acceptable use policy and reduce your risk exposure. “Not safe for work” content can jeopardize relationships with customers and trigger lawsuits for HR violations.

Limit Domestic UsageLimit Domestic Usage

By putting limits on domestic use, you control data use immediately and eliminate “bill shock.” Caps reduce data used daily without impacting productivity. Do this two ways: enforcement and simplifications.

User Response to Domestic Usage LimitsUser Response to Domestic Usage Limits

When users are aware of their limits, they tend to police their own usage. And when caps are reached, any blocks on the cellular interface will force users to find Wi-Fi services that allow them to maintain connectivity.

Limit Roaming UsageLimit Roaming Usage

Roaming can create the biggest item on an enterprise mobility bill, but by capping it before anyone travels, enterprises protect their data allocation, save data and prevent overages. Be mindful of what you whitelist because that can allow business-critical usage to continue beyond the specified threshold.

Control TetheringControl Tethering

A phone tethered to a laptop or tablet can consume a vast amount of mobile data. By monitoring tethering and limiting it when necessary, you can reduce significant data costs. Used in conjunction with domestic and roaming, caps can help the enterprise manage financial risks.

Compress Mobile DataCompress Mobile Data

Compressing the data that travels to the mobile device also saves data. While not all data is compressible, you can compress video or photos.

Eliminate NoiseEliminate Noise

Mobility can help employees stay productive, but also introduces distractions. Eliminate the noise and reduce access to productivity-draining games and social media content. That not only helps keep people focused, it helps control costs.

Interest in Layered ProtectionInterest in Layered Protection

Invest in: A multi-level solution that helps protect the device and its configuration as well as the apps on it. Websites accessed in real time. Infrastructure. Wi-Fi hotspots.

Monitor Threats and Educate UsersMonitor Threats and Educate Users

No solution can protect you 100% from threats. User training is a must. Find out what threats users encounter daily and train them to stop accessing phishing websites and downloading their malware.

Help Employees Protect ThemselvesHelp Employees Protect Themselves

It’s in your company’s best interest to help your employees protect themselves and ensure that they are not the weakest links in the chain.

Karen A. Frenkel Avatar