In our first piece in this series, we discussed the challenges for IT administrators in adopting Android into the workplace. Android presents many security obstacles to IT due to its open source platform, variety of device manufacturers, carriers, and multiple versions of mobile operating systems. The main challenge for the enterprise is securing company data. Although there are many obstacles, they are not insurmountable.
While the enterprise prefers to use secure choices in their mobile devices, they also want to provide employees with flexible and familiar choices. Here are some tips for IT administrators to help secure the Android platform substantially, so employees and businesses can have the best of both worlds.
1. Regulate Android Use
Some enterprises choose to simplify this challenge by regulating Android usage. IT admins can choose to only allow a limited number of certain Android models or limit access to certain apps and content, therefore giving admins better control over the security of the data as there are fewer variables to secure. However, without a proper mobile management tool, it can be difficult to enforce policies and prevent user workarounds.
2. Supplement Android with Mobile Device Management (MDM)
Mobile device management is a baseline solution that helps to solve the challenges that Android presents in the enterprise. MDM can provide protection such as enforcement of the usage of passwords and pins, remote device locking/wiping, and even data encryption. MDM gives IT greater control over the device and is well-suited for corporate-owned devices, however, it can introduce challenges when policies are too restrictive for users, or if policies need to be customized at the app and data level. While MDM helps to solve the challenges of Android in the enterprise to an extent, MDM in itself is not full protection.
3. Add Additional Threat Protection for Android
MDM alone does not protect from malware and other threats. By supplementing Android devices with threat protection, the devices then can be protected from threats such as backdoors, mobile malware, grayware, malicious websites, data stealing apps as well as the ability to report threats to the enterprise. Android OS in particular may introduce risks from apps downloaded through the largely unregulated 200+ app stores available. With a threat protection solution, apps can be scanned and evaluated prior to download.
4. Bring Protection to the Apps with Mobile Application Management (MAM)
Regardless of whether the device is Android or not, MAM provides control at the app level by allowing admins the ability to apply policy controls to individual apps, without interfering with the user experience or user privacy. Developing a solid MAM solution enables admins to have control over apps, regardless of device ownership, and manage the delivery, updating and remote locking/wiping of mobile apps. MAM also monitors app performance, app configuration, provides reporting and tracking services, usage analytics, and app wrapping for corporate apps, while leaving personal apps and data untouched.
While Android presents many challenges in the world of the enterprise, admins can now keep up with the growing popularity of Android in the consumer market and appease employees’ preferences by implementing these tips.