How to manage smartphones in your business
A guide for iPhones, Androids, BlackBerry and Windows Mobile OS
By Tony Bradley | PC World | Published: 12:12, 21 June 2010
Over the last decade, smartphones have evolved from relatively simple mobile communications devices to robust palm-sized computing platforms that have transformed travel time from a loathsome efficiency drag to a productive part of any workday. Workers can now go more places with less downtime. But this benefit is offset somewhat by the increased burden they place on IT administrators to effectively provision and maintain them, and the security risks of carrying sensitive data on portable devices.
A recent RingCentral survey illustrates just how attached business professionals have become to their smartphones. An overwhelming 83 percent of those surveyed would give up their morning cup of coffee before parting with their smartphone. Nearly 80 percent cite their smartphone as the phone they use most to conduct business. So it's clear that businesses need to work fast to get control of this essential communications channel.
Smartphones have altered mobile productivity for both consumers and business professionals, but the needs of any given business can raise unique issues for any smartphone deployment strategy. In many companies--especially smaller ones--employees show up with their own smartphones in hand, and it is the job of the IT department to determine how to effectively integrate this hodgepodge of BlackBerrys, Android devices, iPhones, and Windows Mobile handsets into the company's infrastructure.
Failure to do so means lost opportunity in streamlining important daily business functions such as scheduling and collaboration. It could also mean severe liability if sensitive customer or proprietary data escapes your control via a lost handset at the airport. But accounting for and delivering centralized services to all these phones is a very real challenge.
IT administrators are tasked with provisioning, inventory tracking, configuration management, messaging, archiving, and maintaining the security of smartphones connected to the network. IT administrators need tools to simplify and centralize smartphone management.
With a combination of policies and procedures governing the use of smartphones, and the right tools to enable IT administrators to monitor and maintain them, smartphones can be an invaluable business tool. Let's examine some of the applications available to help manage smartphones.
Research in Motion (RIM) has been quite successful at establishing its BlackBerry smartphones as the de facto mobile communications device for business professionals. Even President Barack Obama relies on one of the ubiquitous devices for keeping in touch on the go.
One of the primary keys to RIM's success in the enterprise is its BlackBerry Enterprise Server (BES). BES enables enterprise IT departments to maintain and control the mobile messaging systems internally--an important factor for organizations that are concerned about sensitive information traversing third-party or public networks. However, a full BES solution is too complex and too costly for a typical small business.
Earlier this year, RIM introduced a variation of BES targeted specifically at the small-business market--BlackBerry Enterprise Server Express. BES Express is available from RIM as a free download, enabling a small company to deploy and manage up to 75 BlackBerry devices without any additional software or user license fees.
BES Express works with any Internet-enabled data plan, and does not require any additional hardware investment either, since it can be installed and run from the same server hardware running Microsoft Exchange or Windows Small Business Server. If installed on a dedicated server, BES Express can support up to 2000 BlackBerry smartphones.
With BES Express, IT administrators can reset passwords, or remotely wipe data from lost or stolen BlackBerry devices. Applications can be deployed and managed over-the-air, and device, application, and IT policy updates can be scheduled and pushed wirelessly.
Of course, BES Express has some limitations compared with the more comprehensive BES platform. For example, BES Express does not work with IBM Lotus, Novell, or Groupwise, and it can't interact with public instant messaging clients such as AIM or Google Talk. In addition, devices can not be provisioned wirelessly, and BES Express does not offer a high availability configuration.
Microsoft has not been nearly as successful as RIM at establishing its presence for smartphones, but its dominant stake in the server and desktop operating system markets, and the overwhelming reliance on the Microsoft Exchange messaging platform, make it a natural contender for RIM. Microsoft is in a unique position to be able to extend the culture and conventions business professionals are used to on their desktops to the smartphone.
Microsoft Exchange contains the basic capabilities IT administrators need to deploy and maintain Windows Mobile smartphones. Exchange ActiveSync policies provide IT administrators with extensive control over Windows Mobile smartphones. In addition, ActiveSync can automatically provision Exchange e-mail access and allow IT administrators to exercise control over which applications are allowed to run on the smartphone.
For more robust control, smaller companies can use Microsoft System Center Mobile Device Manager (MDM) 2008 to manage Windows Mobile 6.1 and 6.5 devices. System Center MDM provides a centralized management console capable of setting and controlling Windows Mobile smartphone policies through Active Directory and Group Policy. MDM also provides mobile VPN functionality for secure access to network-based resources.
System Center MDM can encrypt files stored on Windows Mobile smartphones--both on the internal smartphone storage and on any memory storage cards, and it enables IT administrators to remotely wipe data from Windows Mobile smartphones in the event that a device is lost or stolen.
Like the Exchange ActiveSync solution, System Center MDM also has the capability to restrict or control which applications can run on the smartphone, and it also allows the IT department to lock down communications and camera functionality.