Apple’s presence has grown from the brands behind some Macs in the creative sector.Now a major mobile and productivity provider All top companies..Still Apple’s platform faces security challenges As people Work remotely..Caught up Truce software CEO Joe Boyle discusses his company’s approach with Apple at work Mobile enterprise management..
Apple goes to work
“Today, Apple and businesses feel like they’re virtually synonymous,” Boyle said.
Even companies that don’t publish the Mac or iPhone itself may support their use by employees. “As the ecosystem of available enterprise partners has expanded, it has become possible to fully outsource and automate the entire life cycle of Apple devices,” he said.
“IT consumerization has caused a major shift in support of Apple’s growing presence in the enterprise. From an enterprise mobility perspective, Apple devices have grown and expanded in a variety of industries and use cases. Companies want to harness the power of the iOS platform to enable more connected and well-equipped employees. “
There are other trends:
- Employees are increasingly using their devices and computers for work.
- they are More involved than ever With the technology they use.
- Enterprises are taking a mobile-first approach.
According to Boyle, this trend has also changed business processes. “Companies have transformed workflow processes into mobile-friendly (if not mobile-first), making workers and overall operations more efficient,” he said.
“As mobile devices are replacing traditional workflows, enterprises are realizing the benefits of allowing these advanced features. In addition, Apple’s privacy stance has made enterprises and their employees more comfortable. You can feel protected when deploying and using the same thing. Mobile devices, both at work and in individuals. “
But in an asynchronous distributed environment, security remains a challenge.
Cross-border mobile security
Traditional security models rely on perimeter security. This is a concept that is loosely based on the idea of putting a fence around something that is important to you and defending it. This concept hasn’t been well reflected in the mobile world, driving the evolution of new security models, even on platforms that are more secure than most of Apple’s platforms.
“The nature of mobility has forever changed the way businesses need to think about managing their environment, but most approaches and technologies are still built from the PC paradigm,” Boyle said.
Traditional perimeter security has been fixed and obsolete in that today’s employees do not consider many ways to be dynamic. Workers are distributed and use different devices in different ways at different times.
“In enterprise mobility security, we need to consider who is using the device, how, when, and where. In the ceasefire, we call it the human element of mobility management. Through shifts, workers As the environment changes, so do worker permits, “says Boyle.
This context-driven approach to security means that enterprises need to know which workers are using which devices and where, and how those devices are typically used. “For example, security parameters adapt accordingly as device usage evolves across worker shifts, based on where and what employees are doing,” he said.
It is also important that these security models are location aware. “It’s important not only to know where the device is, but also to know other details such as time of day and proximity to high-risk equipment, and to have the ability to change security policies as the environment changes. “He said.
The problem for many employees is that as context awareness increases, they become skeptical about giving employers more access to personal data than they need to. This is especially difficult when both personal and professional (digital) life coexist on mobile devices.
“The tug of war between IT, which needs to tightly manage network security to protect data, and operations that require broader mobile privileges to enable employees to take advantage of more features. It’s still common, “says Boyle. “User privacy is also considered an important consideration in the context of mobile devices at work.
“Context mobility management allows you to understand that users are not static and manage devices based on how individual users’ environments change throughout the shift.“ Advanced employee mobility. Only happens when the company adopts a mobile device policy and acknowledges the fact that workers are not static.
“This is a new model of the modern workforce,” he said.
Copyright © 2021 IDG Communications Co., Ltd.
Situations are needed to protect Apple mobile businesses
Source link Situations are needed to protect Apple mobile businesses