Ultimate-Guide To UEM
Ultimate-Guide To UEM
MKT-EN-0119-US v6.0
Table of Contents
Executive summary 3
Introduction 4
Benefits of UEM
Simplify IT management
Summary 15
Take the next step
With so much data flowing freely across and outside of the perimeter-less enterprise, IT needs to
think about how to establish trust in a zero-trust world where every user, device, app, network,
and cloud could potentially be compromised. Building a zero-trust security environment requires
a new mindset and technical approach to security. But, like almost everything else in security,
starting with good hygiene and establishing a foundational process and architecture are the most
important steps. Fortunately, that’s something every organization can start doing today.
Unified endpoint management (UEM) plays a critical role in helping organizations transition
from traditional enterprise security by establishing a zero-trust environment where users can
confidently embrace modern endpoints, desktops, apps, and cloud services for work. UEM
provides the foundation for a mobile-centric, zero trust enterprise journey that leverages a
sophisticated trust model and dynamic policy framework to continuously determine whether to
provide access to corporate data. The ultimate goal is to ensure users stay productive and happy
on their device of choice, wherever they work, while protecting your business from the latest
threats.
This guide is designed to help mobile enterprise leaders execute a UEM strategy that enables
them to transform business processes from legacy systems to secure, modern computing
architectures capable of supporting today’s digital workplace. In addition to describing how
UEM works, this guide also illustrates a typical UEM implementation with detailed, best-practice
deployment processes and recommendations for a successful mobile-cloud journey.
Compounding this challenge is the fact that mobile and cloud infrastructures are
As IoT devices and cloud adoption become more mainstream, IT needs insight into
highly decentralized across the perimeter-less enterprise. Organizations might not
security threats and vulnerabilities on devices and networks they may not own. With
own all of the endpoints that access enterprise apps and data. For example, they can
the proliferation of mobile threats and network attacks, every IT organization will likely
be owned by employees in a bring your own device (BYOD) scenario. Even devices
have to manage a security breach such as a malware attack, compromised credentials,
issued by the organization to its employees fall into a variety of deployment models,
or a stolen device — and the ability to respond quickly and decisively is critical. At the
such as corporate-owned, personally enabled (COPE) and company-owned, business-
same time, CIOs and CISOs need to ensure compliance with government regulations
only (COBO) devices, and are subject to varying levels of control by the organization.
such as the General Data Protection Regulation (GDPR) in Europe, the Health Insurance
However, even if IT owns the physical device, the device manufacturer controls OS
Portability and Accountability Act (HIPAA) in the US, and the the Payment Card Industry
updates and security patches and the user decides when to install them — without
Data Security Standard (PCI DSS), which is a set of security standards designed to
any IT intervention. Furthermore, mobile users are now accustomed to going to the
ensure secure credit card transactions.
Apple App Store or Google Play to download applications instead of waiting for IT to
administer them. With the era of perimeter-based, IT-controlled desktop security giving way to the
modern digital workplace, now is the time for enterprise leaders to learn how UEM
provides a secure foundation based on zero trust to ensure complete mobile security
without sacrificing mobile productivity.
1 https://www.csoonline.com/article/3244248/data-protection/top-5-cybersecurity-questions-for-the-ciso-in-2018.html
The digital workplace is dramatically shifting the role of IT in the enterprise. Instead
Know the challenges of dictating which technologies employees will use, IT now needs to support the
variety of mobile technologies employees bring into the enterprise. IT organizations
that don’t support mobile users or their preferred devices will quickly find themselves
Every organization’s mobile-cloud deployment strategy will be unique based on their
marginalized because mobile employees can simply go around unresponsive IT
individual business and technology requirements. Yet, many of the challenges are the
organizations.
same for any company. For instance, each organization has to figure out how to support
device choice, securely administer mobile apps and content, protect data from an
Mobile app and content management
expanding threat landscape, and above all, provide an excellent device experience to
end users. According to IDC, total mobile app downloads will exceed 210 billion and generate
nearly $57 billion by 2020. What does that mean for your enterprise? The demand
2
for mobile apps is exploding, and mobile workers now expect to have more than just
corporate email on their devices. And, as more platforms such as iOS increase support
for enterprise app development, the demand will only increase. To meet this demand,
enterprises can no longer take the approach of first developing for a PC-based world
and then transitioning to mobile. All app and content development going forward must
be enabled for mobile first.
One of the biggest mobile challenges is how to secure data and apps (including
third-party apps) on all mobile devices without impacting the native user experience.
Before the mobile era, the biggest security risks were malware and viruses due to the
vulnerability of open file systems and an unprotected kernel. Today, mobile operating
systems have a sandboxed file system and protected kernel, so traditional security
threats present less of a concern. However, mobile technologies are exposed to a
growing landscape of other types of threats, including user-based, device-based,
application-based, and network-based threats.
2 https://www.idc.com/getdoc.jsp?containerId=prUS41240816
NE
loss on mobile requires focus on a
different set of risk vectors.
TWORKS
USERS
Data loss
Data can be lost through cloud services and productivity
apps via open-in, copy, paste, and forwarding functions.
Exploit OS vulnerabilities to jailbreak or root devices, Mobile devices are hyper-connected and often access
bypass security, and install malicious apps from sensitive data over untrusted networks, increasing the
unauthorized app stores. Form factor risk of data loss through Wi-Fi sniffing, rogue access
points, and man-in-the-middle attacks.
Portable form factors make
mobile devices susceptible
to loss or theft.
• Configure, manage, and monitor Android, iOS, macOS, and Windows 10. They can
also manage some Internet of Things (IoT) and wearable endpoints.
• Provide a single view of multi-device users, which helps provide more efficient end-
user support and detailed workplace analytics.
Establish mobile security protocols that protect your devices, apps, and data The best way to ensure fast, widespread UEM adoption is to make the user experience as
without compromising the user experience. With UEM, you can scale to add seamless as possible. When employees experience a familiar, native device and app experience
new features over time as your business needs and budget requirements with enterprise tools, they are more likely to accept compliance measures, avoid shadow IT
change. maneuvers, and stay productive.
• Separate personal and corporate data on mobile devices and desktops • Provide seamless and instant authentication with single sign-on (SSO) and multifactor
to ensure user privacy while protecting corporate data. authentication (MFA) that eliminates the risk of weak passwords.
• Administer an enterprise app storefront to give employees secure and • Enable users to easily access, annotate, and share documents from email, SharePoint, and
convenient access to corporate-managed apps. other enterprise content management systems and cloud services.
• Implement layered security controls that protect mobile devices and • Support multi-user profiles to allow several employees to share a single device.
data without impacting the user experience.
• Help users easily maintain compliance with corporate policies by helping them quickly
• Selectively wipe enterprise data from mobile devices and desktops remediate issues on the device.
while leaving personal data intact.
• Enable self-service so users can enroll and register devices, check Secure business resiliency
compliance, troubleshoot problems, and handle other basic device
Enable workforce productivity with invisible and automated security that protects data integrity,
management issues.
simplifies compliance, and reduces the risk of mobile threats.
Freedom of choice • Deliver immediate, automatic, on-device mobile threat protection that instantly detects
device threats.
UEM is OS- and device-agnostic, which allows users to choose their
preferred devices, whether corporate-owned or BYOD, to stay productive • Administer certificate-based identity management to ensure that only authorized users can
access the device.
wherever they work. IT admins can also deploy either a cloud or on-prem
deployment model depending on their business needs. • Support app containerization to ensure data within each app is encrypted, protected from
unauthorized access, and removed from the device without harming private data.
• Enable a multi-OS environment to support Android, iOS, macOS, or
Windows 10 devices. • Deploy per-app VPN technology to limit corporate network access to authorized apps only.
• Allow users to quickly access enterprise resources such as corporate • Configure DLP policies to prevent data loss through unauthorized file sharing or copy-paste
email, calendar, and cloud services including Office 365, G Suite, actions.
Dropbox, Box, SharePoint, and more.
• Enforce conditional access to automatically trigger actions such as compliance notifications or
device quarantine whenever devices fall out of compliance.
• Encrypt email attachments to ensure they can only be viewed using authorized applications.
Perhaps most importantly, the device and app management features of the UEM
UEM strategy solution should be seamless to the end user. The digital workplace should enable
workers to quickly authenticate and access corporate apps and data without entering
a username and password every time. Users should also have access to self-service
tools that help them manage basic device functions and troubleshoot problems without
Put the user experience first
having to submit a help-desk ticket.
The user experience must be at the center of any mobility initiative. If the device, app,
or content is not something users want or can easily access, then it simply won’t be
adopted no matter how much the IT organization pushes it. So any UEM platform must
Simplify IT management
be able to support the user experience in the following ways: The ability to administer and secure a multi-OS environment that includes a range of
mobile devices, desktops, apps, cloud services, and content is no small task. For this
Enable choice of device and OS reason, every UEM solution should enable IT to:
IT must implement a multi-OS UEM solution that supports modern operating systems
such as Android, iOS, macOS, and Windows 10. Simplify access control and authentication
Protecting sensitive business data requires IT to ensure that only trusted users and
Separate personal and work apps and data devices can access mobile and cloud enterprise apps. However, username/password
Instead of requiring employees to have separate devices for personal and business use, authentication can be tedious, frustrating, and insecure on mobile devices. Therefore,
IT should be able to separate business and personal apps and data on a single device the UEM solution should allow users to authenticate quickly through more modern
(with the possible exception of corporate-owned kiosk devices). This not only simplifies capabilities such as single sign-on (SSO) and multifactor authentication.
app management, it also protects the privacy of a user’s personal data on the device. So
if the employee leaves the company, IT can wipe all business resources from the device Support critical business processes on mobile
while leaving personal apps and content intact. Employees in the digital workplace need to have essential data at their fingertips to
make core business decisions every day. For example, in a retail environment, sales
associates can use mobile apps to assist customers throughout the store. They can
look up inventory or complete customer purchases, which eliminates long lines at cash
registers. A UEM solution should make it easy to deploy business apps to specific users
or groups of users through an enterprise app store.
A layered security approach is fundamental to this transformation because in the mobile-cloud model,
perimeter-based security is no longer adequate. Layered security provides multiple types of security across
mobile devices, apps, and networks, which helps protect data-at-rest on the device as well as in apps and cloud
storage. Best of all, layered security measures operate behind the scenes and remain invisible to the end user, so
mobile productivity is never interrupted by security operations.
BASIC PRODUCTIVITY
best practices Technically savvy users will be more self-sufficient than those who are new to mobile.
Users with less technical experience may require more IT support.
UEM deployment
typically follows this
Plan 2. Which modern operating systems, mobile devices, cloud services, and
desktops will your organization support?
four-step process:
Design The answer to this question requires knowing which devices and clouds are most
popular among employees (especially for BYOD) and whether or not they support your
business needs and security requirements.
Deploy
Phase I: Plan 4. How mature is your IT governance framework, policies, and processes?
1. Define roles
7. Can your IT organization develop and deploy mobile enterprise apps?
First, determine how you want to organize administrative tasks like help-desk support,
Anyone who develops apps for your company should have the experience and
user registration, and device configuration management. For example, how many levels
know-how to deliver an outstanding mobile user experience. This will be critical
of help-desk support do you need? Who will develop and manage your in-house apps
to ensuring the success of your mobile strategy. If you don’t have skilled app
— existing staff or third-party developers? Who will oversee policy and configuration
developers in-house, you will need to outsource this key function.
processes?
1 Define
roles 2 Define
visibility 3 Assign
actions 4 Manage
distribution
How many admins? Which users/devices Which actions can each Which apps, policies,
What responsibilities? does each admin view admin perform? and configurations can
and report on? each admin distribute
to users and devices?
4. Manage distribution • Understand the multi-OS management issues they are likely to face. Clearly define
the troubleshooting steps, escalation process, and responsibilities for resolving each
In this final step, decide which apps, policies, and configurations will be deployed, type of device, app, server, or network issue.
as well as who deploys them and when. Identify which IT admins will be responsible
for various distribution roles, and prevent admins from performing any unauthorized • Engage device experts to provide deeper insight into all of the devices your
help-desk staff will encounter.
actions.
• Access the resources they need for the level of support they will be delivering.
In addition to choosing a vendor with a strong vision and purpose-built UEM platform,
solution provider a solution provider should also maintain a diverse ecosystem of best-of-breed solution
providers. This ensures access to a broad range of technology solutions to meet current
business and infrastructure requirements.
One of the most frequently asked questions about UEM is how to find a provider that
can meet all of your unique requirements. Here are a few key criteria that can help
Reputation for customer success
narrow and accelerate your search:
Review the UEM vendor’s customer portfolio and standing within the analyst
Choice computing community. Not only should the vendor serve a diverse, global customer base, it should
have a UEM leadership ranking among top industry analysts. By researching these
Think about what mobile devices looked like five or 10 years ago. Some of those brands
factors you can be sure the vendor has the proven longevity, experience, and credibility
barely exist anymore. Chances are, mobile technology will look very different five years
necessary to meet your long-term mobility goals.
from now, especially as IoT devices continue to proliferate. Instead of trying to predict
which mobile platforms will rise to the top in a hyper-competitive market, it’s much
easier to adopt a solution that allows users to choose the tools that best support their
productivity and success. Then there’s no need to worry about which mobile devices
and desktops to support, because the vendor will be able to manage them all.
Purpose-built platform
MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero
trust platform built on the foundation of unified endpoint management (UEM) to secure
Enterprise mobility is not just about buying the latest mobile devices or putting
access and protect data across the perimeter-less enterprise. Zero trust assumes that
email on an employee’s phone. It’s about transforming your business through
bad actors are already in the network and secure access is determined by a “never trust,
a mobile-centric, zero trust model of security that ensures compliance while
always verify” approach. MobileIron goes beyond identity management and gateway
giving your users the freedom they need to be productive and successful
approaches by utilizing a more comprehensive set of attributes before granting access.
wherever they work. Although embarking on a mobility initiative can seem like
A mobile-centric, zero trust approach validates the device, establishes user context,
exploring vast, uncharted territory, the right UEM solution can help you quickly
checks app authorization, verifies the network, and detects and remediates threats
move forward on your journey to becoming a modern mobile enterprise.
before granting secure access to a device or user.
Find out how MobileIron can help you securely transform your critical business
processes with our proven, industry-leading UEM platform and professional services.
Please visit us at www.mobileiron.com