Implementing enterprise mobility management
One of the challenges of supporting devices in a hybrid network is the fact that the traditional network perimeter has been moved, so there is no longer a fixed enterprise boundary – in other words, users are accessing information systems from outside the enterprise. In many cases, information systems can be managed by third parties such as cloud providers. We call this phenomenon de-perimeterization.
Enterprise mobility management is the process of ensuring that mobile devices comply with the enterprise security policy. An enterprise will have the challenge of supporting mobile users, home/remote working setups, and personal computing devices that are not managed using traditional on-premises controls. We must accept that the business will have a need for this hybrid approach, but we also must understand the controls needed to protect the business from the loss, theft, and exfiltration of valuable business data. To ease the administration...