GSX Blog

Why monitoring security is a must

Posted by Meryll Moreau on Mon, Oct 19, 2015

Screen_Shot_2015-10-19_at_3.03.54_PM-1.pngImagine driving a car today without a dashboard. You’d have a relative sense of your speed based on other vehicles around you, but you wouldn’t actually know your precise speed until you encountered a problem — for instance, if you were pulled over by a policeman for speeding. You’d have very little warning if your engine was overheating, your tire pressure was dropping, or you were about to run out of oil. In short, you wouldn’t know the what, when, or where of a problem until your car was already broken down and leaving you stranded on the side of a street.

Managing IT services and infrastructure without the right monitoring solution is rather like driving a car without a dashboard. Without the proper tools in place, IT teams are operating without critical knowledge about the status of key systems. When your approach is reactive instead of proactive, service interruptions and downtime are inevitable.

We’re all well aware of the heavy costs associated with network downtime — according to Gartner, the average damage is well over $300,000 per hour. In addition to the financial strain, IT outages have a serious impact on morale. Ultimately, IT frustrations can lead to lost productivity and a high turnover rate.

As we outlined in a previous blog post, these are the top 5 security breaches for mobile:

  1. Wireless transmissions are not always encrypted. Information sent by a mobile device, including email, is usually not encrypted while in transit. In addition, many mobile devices do not have firewalls to limit Internet connections.
  2. Mobile devices often do not have passwords enabled to authenticate users and control data access. On top of that, two-factor authentication is not always used when conducting sensitive transactions on mobile devices.
  3. Mobile devices may contain malware. Consumers can unknowingly download applications containing malware, oftentimes because an app is disguised as a game, security patch, or utility.
  4. Operating systems, as well as software on mobile devices, may be out-of-date. This includes security software. It can take weeks to months before security updates are provided to the consumers' devices.
  5. Mobile devices may have unauthorized modifications. The process of modifying a mobile device and removing its limitations (known as "jailbreaking" or "rooting") so that consumers can add features alters how security for the device is managed and can increase security risks.

It’s no wonder, then, that IT teams from all industries have been pushing for better tools to gain greater visibility into their organization’s environments and be able to analyze performance, plan for future requirements, and engage in preventative troubleshooting. Nowadays, monitoring plays a critical role in enterprise security management. Features like improved visibility, enhanced reporting, and custom alerts are helping IT administrators to be proactive about potential breaches and address them before they cause major problems.

But monitoring tools shouldn’t be limited to obvious infrastructure elements like assembly lines and data networks; they should also cover all aspects of enterprise mobility, from the devices themselves to the back-end enterprise mobility management (EMM) solutions used to maintain productivity and security. Mobile devices have indubitably taken on a mission-critical status for most enterprises, and for this reason, advanced monitoring for enterprise mobility is emerging as an integral service. High-stakes industries like finance, healthcare and government understand the need and are actively seeking and implementing solutions, but many organizations (especially in non-regulated industries) still believe this is an area in which they can afford to cut corners.

Many EMM solutions come equipped with basic monitoring capabilities, but these are rarely comprehensive and act merely as add-ons. Advanced mobility monitoring shouldn’t be viewed as a luxury for the enterprise — it is an absolute must-have, and should be procured from specialist, third-party providers. Without a comprehensive EMM solution, your organization is unnecessarily exposing itself to a range of avoidable risks.

Read more content on a joint whitepaper we issued together with BlackBerry explaining the importance of delivering advanced proactive monitoring to their Enterprise Mobility Management (EMM) solutions.



Try it now and start monitoring your EMM deployments!

Tags: Monitoring BES, MDM, Enterprise Mobility, EMM