What is Mobile Device Management and how does it work?

Definition, functions, benefits and possible uses of an MDM

The abbreviation MDM stands for Mobile Device Management and describes a software system that enables the central administration and protection of mobile devices. It is traditionally used in companies to securely integrate smartphones, tablets and laptops into the company network. Central functions are monitoring, protection of data on the devices and in the network as well as distribution of software and software updates. Additional features such as malware detection, device location and remote control, containerization to separate private and professional data, and policy management and reporting make the MDM the perfect tool for meeting EU GDPR requirements.

Enterprise mobility management: controlled security, more flexibility and relief for IT

Mobile working and home office has been part of everyday life in many companies since Covid-19 at the latest. Mobile end devices such as smartphones or tablets are part of the basic technical equipment.

For IT, more end devices with different operating systems mean, on the one hand, an increased security and data protection risk that needs to be addressed and compensated for. On the other hand, setting up and managing the additional devices creates additional work that should not be underestimated. Compliance with the EU GDPR proves to be particularly critical: Once the devices are out of hand, the status of the devices and applications is unknown. The mobile operating systems hardly support data protection and data separation.

An EMM (Enterprise Mobility Management) or MDM (Mobile Device Management) addresses all of these problems: It takes care of the system integration, monitors the device status, regulates data access and enables remote maintenance.

Read more: Prepare your IT routines and IT security for mobile work

MDM

This is how you enable mobile working and master the challenges of the EU GDPR

Symbolbild Homeoffice

Around 80 percent of companies access the Internet and company data with portable devices. Mobile working is a concern for many employers and employees – be it business trips or field work, the desire for more flexibility or simply the additional use of smartphones and tablets.

Both customers and partner companies want their data to be kept safe and well protected. While workstations and server landscapes usually already have tried and tested security precautions, the use of mobile devices poses new, sometimes complex challenges for IT – starting with the fact that these are more difficult to keep track of and some non-company devices access company data.

Read more: Seamless data protection even with mobile working

Principles of the EU GDPR when handling personal data and what this means for companies

dsgvoThe EU General Data Protection Regulation requires a lot from companies dealing with sensitive data. According to Article 32 (“Security of processing”), for example, companies must verifiably ensure that suitable organizational and technical security requirements based on the state of the art are also observed on mobile devices. All risks and security precautions must also be assessed and documented according to Article 35 (“Data protection impact assessment”), and Article 32 paragraph 1d) also requires “Procedures for regularly checking, assessing and evaluating the effectiveness of technical and organizational measures to ensure the security of the Processing”. IT departments face new challenges.

Read more: EU-GDPR Compliance: Security and Data Protection To-Go

IKARUS mobile.management

Complete solution to optimize and secure your mobile communication and work processes

Laptops and smartphones support our mobility and productivity. At the same time, data security and the legal framework must be guaranteed. The balancing act between strict specifications and flexible use requires an intelligent solution.

IKARUS mobile.management allows simple and quick tailored solutions to be created for the efficient management of your mobile devices, applications and data. The cloud service is equally suitable for small companies and for enterprises – any amount of end devices can be connected. Invoicing is dependent on the number of licences. The benefit of security: All data is processed only in servers located in Austria in the ISO-certified data-processing centre Interxion in Vienna (ISO27001 and BS25999). Austrian and EU data protection laws apply in their entirety.

Read more: Mobility solutions for corporate environments

Focus on quality and reliability – a success story

Gerhard Eber, ICT-Manager SUZUKI AUSTRIA (© Lukas Dostal)

SUZUKI relies on the highest quality standards with a focus on customers, relationships and the environment. Suzuki also works quickly and precisely behind the scenes.

IKARUS mobile.management ensures optimal mobility in the Austrian dealer network: Within a few days, with the setup of the MDM solution, complete transparency was created for all mobile devices and compliance with the EU GDPR was guaranteed.

Read more: Light, precise, fast and safe: The SUZUKI mobile fleet

Behind the scenes: Android malware analyst Tibor Elias

Tibor ÉliásFor more than six years, Tibor Éliás has been disassembling Android malware. As a malware analyst, he has witnessed how mobile threats have evolved and spread over the last few years.

“A good malware analyst keeps up with the rapid developments and always finds new ways to fend off attacks.”

Read more: Going deep – Tibor Éliás, Android Senior Malware Analyst at IKARUS Security Software about malware, puzzle pieces and real successes.

fakebank

Tricks and deception maneuvers of mobile attackers

It’s so easy for criminals to get your data and your money: Tibor Éliás, Android malware expert at IKARUS, uses the “FakeBankApp” specially programmed for this purpose to analyze and demonstrate how infected apps can access your bank data unnoticed.

A short but deep insight into how malware works on Android – including expert tips and recommendations for securing your own apps

Read more: Mobile overlay attacks on Android

Sicherheitstools

Free security tools for Android devices

IKARUS mobile.security has been providing free access to a professional virus scanner for Android since 2013. If you want more, you can upgrade to the Pro version with remote control features, URL filter and privacy control.

Read more: Security for ANDROID devices

The IKARUS TestVirus is NOT a real virus, just a harmless test app with the EICAR Standard Anti-Virus Test File. The app can be used to test the functionality of security apps and to be able to observe the behavior of the app in the event of a threat.

Read more: IKARUS TestVirus on Google Play

MITRE ATT&CK Framework
Harmony Mobile by Check Point
Data Loss Prevention
location tracking
Tiktok-Verbot auf Diensthandys
insider threat
secure online gaming
destroy

Wiper-Malware

WE ARE LOOKING FORWARD TO HEARING FROM YOU!

IKARUS Security Software GmbH Blechturmgasse 11
1050 Vienna

Phone: +43 1 58995-0
Sales Hotline:
+43 1 58995-500
sales@ikarus.at

SUPPORT HOTLINE

Support hotline:
+43 1 58995-400
support@ikarus.at

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm
24/7 support by arrangement

Remote maintenance software:
AnyDesk Download