Feb 03, 2014 09:34 AM EST
Mobile Device Management (MDM) is unique and personal to the enterprise platform. MDM in Android mobile devices offer a convenient way to configure, enhance security and provide self-service type tools. With today’s best practices, ensuring MDM is crucial. The right installation process which include profile installation enables secure connection to internal networks. MDM can provide convenience by automatically configuring multiple settings.
Privacy is still a consistent concern within the Android market. Through MDM, the secure access on a mobile Android device ensure that the organization or user is embracing privacy best practices. Using privacy controls on the mobile device is important. The initial steps begin with installation through the Android device.
The IT Services at Stanford University tested a variety of devices running the Android OS and found significant differences in the features offered among the devices due to the manufacturer and model, the operating system, and the carrier. These differences can impact your ability to employ MDM.
Stanford approved the following devices tested with good results:
HTC One X+
Samsung S4
Samsung Galaxy Note ll
MDM Devices with known issues:
Asus Nexus 7
Kyocera Event
Motorola RAZR
Samsung Galaxy Tab 2
Asus Nexus 7
Motorola RAZR
Samsung Tab 10 inch
There were also devices which were listed as not supported with MDM. These Android devices include LG Optimus, Kindle Fire and Kindle Fire HD. Android MDM Installation can begin by enrolling the users Android device in the MDM service using the recommended AirWatch app from the Google Play Store.
For installation to be effective, the users device must be encrypted. If it has not yet been encrypted, a red alert will turn on. To encrypt the Android device, it must have a password with a minimum of four digits, be plugged in, and be charged to 80%. The entire process may take up to two hours. The users phone must remain plugged in.
The MDM service checks the Android device to make sure it isn't rooted. Making sure the device is secured through setting appropriate passwords in important. Rooting compromises its built-in security features. A daily check-in is typical for an MDM device. Making sure check in is conducted will ensure security controls are managed.